Description
PraisonAI is a multi-agent teams system. Prior to version 1.5.90, run_python() in praisonai constructs a shell command string by interpolating user-controlled code into python3 -c "<code>" and passing it to subprocess.run(..., shell=True). The escaping logic only handles \ and ", leaving $() and backtick substitutions unescaped, allowing arbitrary OS command execution before Python is invoked. This issue has been patched in version 1.5.90.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-w37c-qqfp-c67f | PraisonAI: Shell Injection in run_python() via Unescaped $() Substitution |
References
History
Sat, 04 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PraisonAI is a multi-agent teams system. Prior to version 1.5.90, run_python() in praisonai constructs a shell command string by interpolating user-controlled code into python3 -c "<code>" and passing it to subprocess.run(..., shell=True). The escaping logic only handles \ and ", leaving $() and backtick substitutions unescaped, allowing arbitrary OS command execution before Python is invoked. This issue has been patched in version 1.5.90. | |
| Title | PraisonAI: Shell Injection in run_python() via Unescaped $() Substitution | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-03T22:50:48.913Z
Reserved: 2026-03-31T17:27:08.660Z
Link: CVE-2026-34937
No data.
Status : Received
Published: 2026-04-03T23:17:06.020
Modified: 2026-04-03T23:17:06.020
Link: CVE-2026-34937
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA