CVSS 10.0CVE-2026-34954CVE-2026-34938CVE-2026-34937

Multiple Vulnerabilities in Praisonaiagents Expose Systems

Critical vulnerabilities in Praisonaiagents allow SSRF, sandbox escape, and shell injection. Upgrade to the latest version to mitigate risks.

Published on

Multiple critical vulnerabilities have been discovered in Praisonaiagents, potentially leading to SSRF, sandbox escape, and shell injection attacks. These flaws could allow attackers to execute arbitrary commands and access sensitive information. Users of Praisonaiagents are strongly advised to upgrade to the latest version immediately to mitigate these risks.

These vulnerabilities range from high to critical, with the most severe allowing unauthenticated remote code execution.

What is Praisonaiagents?

Praisonaiagents is a component for Python applications, likely used for agent-based automation or interaction. It provides tools and functionalities for developing and deploying AI agents. Due to the vulnerabilities discovered, it's crucial to search all praisonaiagents CVEs and ensure your deployments are secure. This component's exposure to untrusted inputs makes it a prime target for exploitation, highlighting the importance of robust security measures.

CVE-2026-34954: PraisonAI Has SSRF in FileTools.download_file()

CVSS8.6
Affected versionsPraisonaiagents versions 1.5.94 and earlier are affected. This vulnerability is exploitable if the application allows users to control the URL passed to the `download_file` function.

High severity due to potential for information disclosure and internal access.

EPSS score not available.

The `FileTools.download_file()` function in `praisonaiagents` is vulnerable to Server-Side Request Forgery (SSRF). The function doesn't validate the URL parameter, allowing an attacker to make requests to internal or external resources.

How to fix CVE-2026-34954 in Praisonaiagents

Patch immediately
  1. 1.Upgrade to Praisonaiagents version 1.5.95 or later.
Upgrade Praisonaiagents
pip install --upgrade praisonaiagents

Workaround: Implement URL validation and sanitization before calling `download_file`.

NextGuard automatically flags CVE-2026-34954 if Praisonaiagents appears in any of your monitored projects — no manual lookup required.

CVE-2026-34938: PraisonAI Python Sandbox Escape

CVSS10.0
Affected versionsPraisonaiagents versions 1.5.9 and earlier are affected. This vulnerability is exploitable if the application allows users to execute arbitrary Python code using the `execute_code()` function.

Critical severity due to arbitrary OS command execution.

EPSS score not available.

The `execute_code()` function in `praisonai-agents` allows a Python sandbox escape. By providing a `str` subclass with an overridden `startswith()` method, an attacker can bypass security checks and execute arbitrary OS commands.

How to fix CVE-2026-34938 in Praisonaiagents

Patch immediately
  1. 1.Upgrade to Praisonaiagents version 1.5.90 or later.
Upgrade Praisonaiagents
pip install --upgrade praisonaiagents

Workaround: Avoid using the `execute_code()` function with untrusted code.

CVE-2026-34937: PraisonAI Shell Injection in run_python()

CVSS7.8
Affected versionsPraisonaiagents versions 1.5.9 and earlier are affected. This vulnerability is exploitable if the application allows users to control the code passed to the `run_python()` function.

High severity due to potential for arbitrary OS command execution.

EPSS score not available.

The `run_python()` function in `praisonai` is vulnerable to shell injection. The function constructs a shell command with user-controlled code without proper escaping, allowing attackers to execute arbitrary OS commands.

How to fix CVE-2026-34937 in Praisonaiagents

Patch immediately
  1. 1.Upgrade to Praisonaiagents version 1.5.90 or later.
Upgrade Praisonaiagents
pip install --upgrade praisonaiagents

Workaround: Avoid using the `run_python()` function with untrusted code. Implement proper input validation and sanitization.

Stay ahead of Python vulnerabilities

Proactively detect and remediate vulnerabilities in your Python dependencies. Use NextGuard to monitor your python dependencies and receive alerts on new threats.

Compare Plans

Frequently asked questions

These vulnerabilities in Praisonaiagents highlight the importance of secure coding practices and regular security updates. Ensure you are running the latest version of Praisonaiagents and follow security best practices to protect your systems. see all python vulnerabilities.

Related topics

SSRFSandbox EscapeShell InjectionPython SecurityDependency Management