Code Execution Vulnerability in PraisonAI by Mervin Praison
CVE-2026-39888
10CRITICAL
What is CVE-2026-39888?
PraisonAI, a multi-agent system, has a vulnerability that allows user code execution to bypass security measures in versions prior to 1.5.115. The execute_code() function in praisonaiagents.tools.python_tools defaults to sandbox_mode="sandbox", restricting user code execution within a controlled environment. However, the embedded blocklist for restricted attributes fails to cover key elements that allow frame traversal, such as traceback, tb_frame, f_back, and f_builtins. This oversight permits an attacker to access the real Python builtins dictionary and execute arbitrary code, undermining the sandbox's intended protections. The issue is addressed in version 1.5.115.
Affected Version(s)
praisonaiagents < 1.5.115
