Description
PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access to all registered tools and agent capabilities. This issue has been patched in version 4.5.97.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-98f9-fqg5-hvq5 | PraisonAI Has Authentication Bypass via OAuthManager.validate_token() |
References
History
Sat, 04 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access to all registered tools and agent capabilities. This issue has been patched in version 4.5.97. | |
| Title | PraisonAI: Authentication Bypass in OAuthManager.validate_token() | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-03T22:54:03.542Z
Reserved: 2026-03-31T17:27:08.661Z
Link: CVE-2026-34953
No data.
Status : Received
Published: 2026-04-03T23:17:06.653
Modified: 2026-04-03T23:17:06.653
Link: CVE-2026-34953
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA