Description
PraisonAI is a multi-agent teams system. From version 4.5.15 to before version 4.5.69, the --mcp CLI argument is passed directly to shlex.split() and forwarded through the call chain to anyio.open_process() with no validation, allowlist check, or sanitization at any hop, allowing arbitrary OS command execution as the process user. This issue has been patched in version 4.5.69.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9gm9-c8mq-vq7m | PraisonAI: OS Command Injection in MCPHandler.parse_mcp_command() |
References
History
Fri, 03 Apr 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PraisonAI is a multi-agent teams system. From version 4.5.15 to before version 4.5.69, the --mcp CLI argument is passed directly to shlex.split() and forwarded through the call chain to anyio.open_process() with no validation, allowlist check, or sanitization at any hop, allowing arbitrary OS command execution as the process user. This issue has been patched in version 4.5.69. | |
| Title | PraisonAI: OS Command Injection in MCPHandler.parse_mcp_command() | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-03T22:48:21.261Z
Reserved: 2026-03-31T17:27:08.660Z
Link: CVE-2026-34935
No data.
Status : Received
Published: 2026-04-03T23:17:05.693
Modified: 2026-04-03T23:17:05.693
Link: CVE-2026-34935
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA