Description
PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access to all registered tools and agent capabilities. This issue has been patched in version 4.5.97.
Published: 2026-04-03
Score: 9.1 Critical
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-98f9-fqg5-hvq5 PraisonAI Has Authentication Bypass via OAuthManager.validate_token()
History

Sat, 04 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access to all registered tools and agent capabilities. This issue has been patched in version 4.5.97.
Title PraisonAI: Authentication Bypass in OAuthManager.validate_token()
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-03T22:54:03.542Z

Reserved: 2026-03-31T17:27:08.661Z

Link: CVE-2026-34953

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-03T23:17:06.653

Modified: 2026-04-03T23:17:06.653

Link: CVE-2026-34953

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses