Project Subscriptions
No data.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9qhq-v63v-fv3j | PraisonAI has an incomplete fix for CVE-2026-34935 - OS Command Injection |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 08 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Praison
Praison praisonai |
|
| CPEs | cpe:2.3:a:praison:praisonai:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Praison
Praison praisonai |
Fri, 08 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PraisonAI is a multi-agent teams system. Prior to version 4.6.9, the fix for PraisonAI's MCP command handling does not add a command allowlist or argument validation to parse_mcp_command(), allowing arbitrary executables like bash, python, or /bin/sh with inline code execution flags to pass through to subprocess execution. This issue has been patched in version 4.6.9. | |
| Title | Incomplete fix for CVE-2026-34935: Command Injection in MervinPraison/PraisonAI | |
| Weaknesses | CWE-77 CWE-78 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-08T14:47:27.656Z
Reserved: 2026-04-20T16:14:19.009Z
Link: CVE-2026-41497
Updated: 2026-05-08T14:46:46.723Z
Status : Analyzed
Published: 2026-05-08T14:16:33.843
Modified: 2026-05-08T19:10:22.173
Link: CVE-2026-41497
No data.
OpenCVE Enrichment
No data.
Github GHSA