Description
PraisonAI is a multi-agent teams system. Prior to version 4.5.90, the get_all_user_threads function constructs raw SQL queries using f-strings with unescaped thread IDs fetched from the database. An attacker stores a malicious thread ID via update_thread. When the application loads the thread list, the injected payload executes and grants full database access. This issue has been patched in version 4.5.90.
Published: 2026-04-03
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Database Compromise
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a second‑order SQL injection that occurs in PraisonAI's get_all_user_threads function. Inside the function raw SQL queries are built with f‑strings that embed thread IDs retrieved from the database without escaping. An attacker can store a malicious thread ID via the update_thread endpoint. When the application later fetches the thread list, the injected payload is executed, giving the attacker unrestricted access to the database. This flaw is classified as CWE‑89 and can compromise data confidentiality and integrity.

Affected Systems

The affected product is PraisonAI, developed by MervinPraison. All releases prior to version 4.5.90 implement the vulnerable logic in get_all_user_threads. The issue is triggered through the update_thread operation and is fixed by the patch shipped with version 4.5.90, which sanitizes thread IDs before inclusion in SQL statements.

Risk and Exploitability

The CVSS score of 9.8 classifies this flaw as Critical, indicating that an attacker can fully compromise the database. The EPSS score is less than 1 %, suggesting that exploit attempts are currently rare. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker needs the ability to send a request that stores a malicious thread ID via update_thread, but no additional privileges or pre‑existing session are required beyond normal API access. The likely attack vector is the API or web interface that accepts thread updates. The patch in version 4.5.90 removes the injection vector.

Generated by OpenCVE AI on April 14, 2026 at 21:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PraisonAI to version 4.5.90 or later.
  • Restrict or disable the update_thread function for users who do not need to modify threads.
  • Ensure all thread IDs are validated and sanitized before being used in SQL queries.
  • Monitor database logs for anomalous query patterns that may indicate injection attempts.
  • Verify that the injection no longer triggers after applying the patch.

Generated by OpenCVE AI on April 14, 2026 at 21:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-9cq8-3v94-434g PraisonAI Has Second-Order SQL Injection in `get_all_user_threads`
History

Tue, 14 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Praison
Praison praisonai
CPEs cpe:2.3:a:praison:praisonai:*:*:*:*:*:*:*:*
Vendors & Products Praison
Praison praisonai

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Mervinpraison
Mervinpraison praisonai
Vendors & Products Mervinpraison
Mervinpraison praisonai

Mon, 06 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 22:45:00 +0000

Type Values Removed Values Added
Description PraisonAI is a multi-agent teams system. Prior to version 4.5.90, the get_all_user_threads function constructs raw SQL queries using f-strings with unescaped thread IDs fetched from the database. An attacker stores a malicious thread ID via update_thread. When the application loads the thread list, the injected payload executes and grants full database access. This issue has been patched in version 4.5.90.
Title PraisonAI: Second-Order SQL Injection in `get_all_user_threads`
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Mervinpraison Praisonai
Praison Praisonai
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-06T13:16:17.048Z

Reserved: 2026-03-31T17:27:08.660Z

Link: CVE-2026-34934

cve-icon Vulnrichment

Updated: 2026-04-06T13:16:13.162Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-03T23:17:05.533

Modified: 2026-04-14T18:15:14.820

Link: CVE-2026-34934

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:30:09Z

Weaknesses