Description
PraisonAI is a multi-agent teams system. Prior to version 4.5.90, MCPToolIndex.search_tools() compiles a caller-supplied string directly as a Python regular expression with no validation, sanitization, or timeout. A crafted regex causes catastrophic backtracking in the re engine, blocking the Python thread for hundreds of seconds and causing a complete service outage. This issue has been patched in version 4.5.90.
Published: 2026-04-03
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via regular expression backtracking
Action: Patch/Upgrade
AI Analysis

Impact

MCPToolIndex.search_tools() in PraisonAI accepts a user‑supplied string and compiles it directly as a Python regular expression without any validation, sanitization or timeout. An attacker can send a specially crafted pattern that triggers catastrophic backtracking in Python’s re engine, causing the thread to block for hundreds of seconds and resulting in a full service outage. The main consequence is a denial of service, affecting system availability.

Affected Systems

The flaw exists in the PraisonAI platform developed by MervinPraison. Versions prior to 4.5.90 are vulnerable. The 4.5.90 release and later contain the necessary patch.

Risk and Exploitability

This vulnerability has a CVSS score of 6.5, indicating moderate severity. The EPSS score is below 1%, suggesting a low probability of exploitation in the wild, and it is not listed in the CISA KEV catalog. If the search_tools() function is exposed to external input—through an API or other interface—a remote attacker could send a crafted expression to trigger the denial of service. No additional exploitation requirements are stated in the description, so an attacker would need the ability to submit a custom regex.

Generated by OpenCVE AI on April 9, 2026 at 18:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PraisonAI to version 4.5.90 or later, which applies the necessary fix.
  • If an immediate upgrade is not possible, add input validation or impose a time‑out on regex compilation to prevent catastrophic backtracking.
  • Monitor the service for unusually long processing times and consider rate‑limiting requests to the search endpoint.

Generated by OpenCVE AI on April 9, 2026 at 18:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-8w9j-hc3g-3g7f PraisonAI Has ReDoS via Unvalidated User-Controlled Regex in MCPToolIndex.search_tools()
History

Thu, 09 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Praison
Praison praisonai
CPEs cpe:2.3:a:praison:praisonai:*:*:*:*:*:*:*:*
Vendors & Products Praison
Praison praisonai

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Mervinpraison
Mervinpraison praisonai
Vendors & Products Mervinpraison
Mervinpraison praisonai

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 04 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description PraisonAI is a multi-agent teams system. Prior to version 4.5.90, MCPToolIndex.search_tools() compiles a caller-supplied string directly as a Python regular expression with no validation, sanitization, or timeout. A crafted regex causes catastrophic backtracking in the re engine, blocking the Python thread for hundreds of seconds and causing a complete service outage. This issue has been patched in version 4.5.90.
Title PraisonAI: ReDoS via Unvalidated User-Controlled Regex in MCPToolIndex.search_tools()
Weaknesses CWE-1333
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Mervinpraison Praisonai
Praison Praisonai
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-06T19:05:34.164Z

Reserved: 2026-03-31T17:27:08.660Z

Link: CVE-2026-34939

cve-icon Vulnrichment

Updated: 2026-04-06T19:05:29.491Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-03T23:17:06.330

Modified: 2026-04-09T16:57:59.227

Link: CVE-2026-34939

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:45:34Z

Weaknesses