Cyber Posture

CVE-2026-34935

CriticalPublic PoC

Published: 03 April 2026

Published
03 April 2026
Modified
14 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0004 10.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.

Security Summary

CVE-2026-34935 is a critical command injection vulnerability (CWE-78) in PraisonAI, a multi-agent teams system. It affects versions 4.5.15 through 4.5.68, where the --mcp CLI argument is passed directly to shlex.split() and forwarded unsanitized through the call chain to anyio.open_process(), enabling arbitrary OS command execution as the process user.

Remote attackers require no privileges or user interaction to exploit this vulnerability, which has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). By supplying a malicious --mcp argument, attackers can execute arbitrary commands on the host system with the privileges of the PraisonAI process, potentially achieving full compromise including data exfiltration, persistence, or further lateral movement.

The vulnerability has been patched in PraisonAI version 4.5.69. Mitigation details are available in the GitHub security advisory at https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-9gm9-c8mq-vq7m and the patching commit at https://github.com/MervinPraison/PraisonAI/commit/47bff65413beaa3c21bf633c1fae4e684348368c.

Given PraisonAI's role as a multi-agent teams system, this flaw underscores command injection risks in AI/ML development tools that rely on CLI interfaces for process spawning.

Details

CWE(s)
CWE-78

Affected Products

praison
praisonai
4.5.15 — 4.5.69

AI Security Analysis

AI Category
AI Agent Protocols and Integrations
Risk Domain
Protocol-Specific Risks
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
Matched keywords: mcp

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

The vulnerability enables unauthenticated remote command injection (T1190: Exploit Public-Facing Application) leading to arbitrary OS command execution (T1059: Command and Scripting Interpreter).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References