CVE-2026-34937 - PraisonAI: Shell Injection in run_python() via Unescaped $() Substitution
CVE ID :CVE-2026-34937
Published : April 3, 2026, 11:17 p.m. | 1 hour, 50 minutes ago
Description :PraisonAI is a multi-agent teams system. Prior to version 1.5.90, run_python() in praisonai constructs a shell command string by interpolating user-controlled code into python3 -c "
Published : April 3, 2026, 11:17 p.m. | 1 hour, 50 minutes ago
Description :PraisonAI is a multi-agent teams system. Prior to version 1.5.90, run_python() in praisonai constructs a shell command string by interpolating user-controlled code into python3 -c "
" and passing it to subprocess.run(..., shell=True). The escaping logic only handles \ and ", leaving $() and backtick substitutions unescaped, allowing arbitrary OS command execution before Python is invoked. This issue has been patched in version 1.5.90.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...