Cyber Posture

CVE-2026-44338

HighPublic PoC

Published: 08 May 2026

Published
08 May 2026
Modified
08 May 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0006 17.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-44338 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Praison Praisonai. Its CVSS base score is 7.3 (High).

Operationally, ranked at the 17.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-306 CWE-1188

Disabling non-essential functions and services eliminates the need to secure them, reducing exposure from missing authentication on unnecessary components.

addresses: CWE-1188 CWE-306

Tailoring replaces or augments insecure default initializations with system-specific values and compensating controls before deployment.

addresses: CWE-306 CWE-668

Knowing every system allows confirmation that critical functions are not left without required authentication mechanisms.

addresses: CWE-306 CWE-1188

Tools routinely check for missing authentication on critical functions and exposed interfaces.

addresses: CWE-306 CWE-1188

Training emphasizes enabling and properly using authentication for critical functions, reducing missing authentication exposures.

addresses: CWE-306 CWE-1188

Secure configuration documentation explicitly addresses enabling authentication for critical functions, reducing missing authentication exposures.

addresses: CWE-306 CWE-668

Requires authentication gates on critical functions that must remain unavailable to anonymous public users.

addresses: CWE-306 CWE-668

Public components are isolated in separate subnetworks and critical internal functions are reachable only via controlled interfaces.

NVD Description

PraisonAI is a multi-agent teams system. From version 2.5.6 to before version 4.6.34, PraisonAI ships a legacy Flask API server with authentication disabled by default. When that server is used, any caller that can reach it can access /agents and…

more

trigger the configured agents.yaml workflow through /chat without providing a token. This issue has been patched in version 4.6.34.

Deeper analysisAI

Automated synthesis unavailable for this CVE.

Details

CWE(s)

Affected Products

praison
praisonai
2.5.6 — 4.6.34

CVEs Like This One

CVE-2026-34952Same product: Praison Praisonai
CVE-2026-44334Same product: Praison Praisonai
CVE-2026-40315Same product: Praison Praisonai
CVE-2026-39891Same product: Praison Praisonai
CVE-2026-34955Same product: Praison Praisonai
CVE-2026-39305Same product: Praison Praisonai
CVE-2026-39308Same product: Praison Praisonai
CVE-2026-44340Same product: Praison Praisonai
CVE-2026-34936Same product: Praison Praisonai
CVE-2026-40154Same product: Praison Praisonai

References