Description
PraisonAI is a multi-agent teams system. From version 4.5.15 to before version 4.5.69, the --mcp CLI argument is passed directly to shlex.split() and forwarded through the call chain to anyio.open_process() with no validation, allowlist check, or sanitization at any hop, allowing arbitrary OS command execution as the process user. This issue has been patched in version 4.5.69.
Published: 2026-04-03
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

PraisonAI, a multi‑agent teams system, has an OS command injection flaw. Between versions 4.5.15 and 4.5.68, the --mcp command‑line argument is passed directly through shlex.split() and forwarded to anyio.open_process() without any validation. This enables an attacker who can supply a command line to execute arbitrary operating‑system commands with the privileges of the process user, potentially compromising the entire system.

Affected Systems

The affected vendor is MervinPraison and the product is PraisonAI. All releases from 4.5.15 up to, but not including, 4.5.69 are vulnerable. The issue was fixed in release 4.5.69; later versions are not affected.

Risk and Exploitability

The vulnerability carries a CVSS score of 9.8, indicating critical severity. The EPSS score is below one percent, suggesting a low probability of exploitation in the near term, and it is not listed in the CISA Known Exploited Vulnerabilities catalog. The attack vector, as inferred from the description, is local: an attacker must be able to run the vulnerable CLI command. Successful exploitation would allow execution of arbitrary shell commands and could lead to full system compromise.

Generated by OpenCVE AI on April 14, 2026 at 21:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PraisonAI to version 4.5.69 or later.
  • If an upgrade is not currently possible, restrict use of the --mcp CLI argument or limit the privileges of the user running PraisonAI.
  • Monitor logs for unexpected command execution and review any anomalous activity.

Generated by OpenCVE AI on April 14, 2026 at 21:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-9gm9-c8mq-vq7m PraisonAI: OS Command Injection in MCPHandler.parse_mcp_command()
History

Tue, 14 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Praison
Praison praisonai
CPEs cpe:2.3:a:praison:praisonai:*:*:*:*:*:*:*:*
Vendors & Products Praison
Praison praisonai

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Mervinpraison
Mervinpraison praisonai
Vendors & Products Mervinpraison
Mervinpraison praisonai

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 22:45:00 +0000

Type Values Removed Values Added
Description PraisonAI is a multi-agent teams system. From version 4.5.15 to before version 4.5.69, the --mcp CLI argument is passed directly to shlex.split() and forwarded through the call chain to anyio.open_process() with no validation, allowlist check, or sanitization at any hop, allowing arbitrary OS command execution as the process user. This issue has been patched in version 4.5.69.
Title PraisonAI: OS Command Injection in MCPHandler.parse_mcp_command()
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Mervinpraison Praisonai
Praison Praisonai
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-06T19:04:26.478Z

Reserved: 2026-03-31T17:27:08.660Z

Link: CVE-2026-34935

cve-icon Vulnrichment

Updated: 2026-04-06T19:04:22.554Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-03T23:17:05.693

Modified: 2026-04-14T18:14:51.930

Link: CVE-2026-34935

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:30:09Z

Weaknesses