Description
PraisonAI is a multi-agent teams system. Prior to 4.5.115, the create_agent_centric_tools() function returns tools (like acp_create_file) that process file content using template rendering. When user input from agent.start() is passed directly into these tools without escaping, template expressions in the input are executed rather than treated as literal text. This vulnerability is fixed in 4.5.115.
Published: 2026-04-08
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

PraisonAI’s agent tool definitions allow unescaped user input to be processed by a template rendering engine, which can execute embedded code. This flaw stems from the create_agent_centric_tools() function that returns tools such as acp_create_file, which treat template expressions as code rather than plain text. The result is that an attacker can inject arbitrary code through agent.start() and cause the system to run the supplied code, compromising confidentiality, integrity, and availability of the host environment.

Affected Systems

The vulnerability affects all instances of MervinPraison PraisonAI below version 4.5.115. The affected product is the multi‑agent teams platform offered by MervinPraison, specifically any deployment that uses the legacy create_agent_centric_tools() API to build agent‑centric tools.

Risk and Exploitability

The CVSS score of 8.8 indicates high severity. No EPSS data is provided, so the exact probability of exploitation in the field is unknown. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw by sending crafted input to agent.start() from an untrusted source; the lack of input sanitization allows template expressions to be interpreted and executed by the backend.

Generated by OpenCVE AI on April 8, 2026 at 22:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PraisonAI to version 4.5.115 or later to apply the official fix
  • If an upgrade is not immediately possible, restrict or sanitize inputs passed to agent.start() so that the template engine receives only literal strings
  • Refer to the MervinPraison advisory https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-hwg5-x759-7wjg for additional guidance

Generated by OpenCVE AI on April 8, 2026 at 22:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-hwg5-x759-7wjg PraisonAI has Template Injection in Agent Tool Definitions
History

Wed, 22 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Praison
Praison praisonai
CPEs cpe:2.3:a:praison:praisonai:*:*:*:*:*:*:*:*
Vendors & Products Praison
Praison praisonai

Thu, 09 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Mervinpraison
Mervinpraison praisonai
Vendors & Products Mervinpraison
Mervinpraison praisonai

Wed, 08 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Description PraisonAI is a multi-agent teams system. Prior to 4.5.115, the create_agent_centric_tools() function returns tools (like acp_create_file) that process file content using template rendering. When user input from agent.start() is passed directly into these tools without escaping, template expressions in the input are executed rather than treated as literal text. This vulnerability is fixed in 4.5.115.
Title PraisonAI has a Template Injection in Agent Tool Definitions
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Mervinpraison Praisonai
Praison Praisonai
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-09T13:49:10.631Z

Reserved: 2026-04-07T20:32:03.011Z

Link: CVE-2026-39891

cve-icon Vulnrichment

Updated: 2026-04-09T13:49:01.031Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T21:17:01.403

Modified: 2026-04-22T16:51:30.870

Link: CVE-2026-39891

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:27:12Z

Weaknesses