Remote Code Execution Vulnerability in PraisonAI Affecting AgentService Method
CVE-2026-39890

9.8CRITICAL

Key Information:

Status
Vendor
CVE Published:
8 April 2026

What is CVE-2026-39890?

PraisonAI, a multi-agent teams system, has a vulnerability in the AgentService.loadAgentFromFile method, which uses the js-yaml library to parse YAML files. The flaw lies in the failure to disable dangerous tags, such as !!js/function and !!js/undefined. This oversight allows an attacker to craft a malicious YAML file that, when uploaded via the API endpoint, can execute arbitrary JavaScript code on the server. This capability leads to potentially severe impacts, including remote code execution. The issue is resolved in version 4.5.115.

Affected Version(s)

PraisonAI < 4.5.115

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.