Description
PraisonAI is a multi-agent teams system. Prior to 4.5.115, the AgentService.loadAgentFromFile method uses the js-yaml library to parse YAML files without disabling dangerous tags (such as !!js/function and !!js/undefined). This allows an attacker to craft a malicious YAML file that, when parsed, executes arbitrary JavaScript code. An attacker can exploit this vulnerability by uploading a malicious agent definition file via the API endpoint, leading to remote code execution (RCE) on the server. This vulnerability is fixed in 4.5.115.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-32vr-5gcf-3pw2 | PraisonAI Vulnerable to Remote Code Execution via YAML Deserialization in Agent Definition Loading |
References
History
Wed, 08 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PraisonAI is a multi-agent teams system. Prior to 4.5.115, the AgentService.loadAgentFromFile method uses the js-yaml library to parse YAML files without disabling dangerous tags (such as !!js/function and !!js/undefined). This allows an attacker to craft a malicious YAML file that, when parsed, executes arbitrary JavaScript code. An attacker can exploit this vulnerability by uploading a malicious agent definition file via the API endpoint, leading to remote code execution (RCE) on the server. This vulnerability is fixed in 4.5.115. | |
| Title | PraisonAI Affected by Remote Code Execution via YAML Deserialization in Agent Definition Loading | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-08T20:45:30.928Z
Reserved: 2026-04-07T20:32:03.011Z
Link: CVE-2026-39890
No data.
Status : Awaiting Analysis
Published: 2026-04-08T21:17:01.267
Modified: 2026-04-08T21:25:14.927
Link: CVE-2026-39890
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA