Cyber Posture

CVE-2026-34938

CriticalPublic PoC

Published: 03 April 2026

Published
03 April 2026
Modified
14 April 2026
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0004 13.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Python commands and scripts for execution.

Security Summary

CVE-2026-34938 is a critical sandbox bypass vulnerability in PraisonAI, a multi-agent teams system. Prior to version 1.5.90, the execute_code() function in the praisonai-agents component executes attacker-controlled Python code within a three-layer sandbox. This protection can be fully circumvented by passing a string subclass with an overridden startswith() method to the _safe_getattr wrapper, resulting in arbitrary OS command execution on the host system. The vulnerability is associated with CWE-693 and carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).

A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required. By crafting malicious input that triggers the sandbox bypass, the attacker achieves full remote code execution on the host, potentially compromising confidentiality, integrity, and availability across the affected scope.

The vulnerability has been patched in PraisonAI version 1.5.90. Additional details on the issue and remediation are available in the GitHub security advisory at https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-6vh2-h83c-9294.

Details

CWE(s)
CWE-693

Affected Products

praison
praisonaiagents
≤ 1.5.90

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.006 Python Execution
Adversaries may abuse Python commands and scripts for execution.
Why these techniques?

Remote unauthenticated sandbox bypass in a network-accessible Python-based application enables exploitation of a public-facing application (T1190) leading to arbitrary code execution via Python interpreter (T1059.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References