Multiple critical vulnerabilities have been discovered in Praisonaiagents, potentially leading to SSRF, sandbox escape, and shell injection attacks. These flaws could allow attackers to execute arbitrary commands and access sensitive information. Users of Praisonaiagents are strongly advised to upgrade to the latest version immediately to mitigate these risks.
These vulnerabilities range from high to critical, with the most severe allowing unauthenticated remote code execution.
What is Praisonaiagents?
CVE-2026-34954: PraisonAI Has SSRF in FileTools.download_file()
High severity due to potential for information disclosure and internal access.
EPSS score not available.
The `FileTools.download_file()` function in `praisonaiagents` is vulnerable to Server-Side Request Forgery (SSRF). The function doesn't validate the URL parameter, allowing an attacker to make requests to internal or external resources.
How to fix CVE-2026-34954 in Praisonaiagents
Patch immediately- 1.Upgrade to Praisonaiagents version 1.5.95 or later.
pip install --upgrade praisonaiagentsWorkaround: Implement URL validation and sanitization before calling `download_file`.
NextGuard automatically flags CVE-2026-34954 if Praisonaiagents appears in any of your monitored projects — no manual lookup required.
CVE-2026-34938: PraisonAI Python Sandbox Escape
Critical severity due to arbitrary OS command execution.
EPSS score not available.
The `execute_code()` function in `praisonai-agents` allows a Python sandbox escape. By providing a `str` subclass with an overridden `startswith()` method, an attacker can bypass security checks and execute arbitrary OS commands.
How to fix CVE-2026-34938 in Praisonaiagents
Patch immediately- 1.Upgrade to Praisonaiagents version 1.5.90 or later.
pip install --upgrade praisonaiagentsWorkaround: Avoid using the `execute_code()` function with untrusted code.
CVE-2026-34937: PraisonAI Shell Injection in run_python()
High severity due to potential for arbitrary OS command execution.
EPSS score not available.
The `run_python()` function in `praisonai` is vulnerable to shell injection. The function constructs a shell command with user-controlled code without proper escaping, allowing attackers to execute arbitrary OS commands.
How to fix CVE-2026-34937 in Praisonaiagents
Patch immediately- 1.Upgrade to Praisonaiagents version 1.5.90 or later.
pip install --upgrade praisonaiagentsWorkaround: Avoid using the `run_python()` function with untrusted code. Implement proper input validation and sanitization.
Stay ahead of Python vulnerabilities
Proactively detect and remediate vulnerabilities in your Python dependencies. Use NextGuard to monitor your python dependencies and receive alerts on new threats.
Compare PlansFrequently asked questions
These vulnerabilities in Praisonaiagents highlight the importance of secure coding practices and regular security updates. Ensure you are running the latest version of Praisonaiagents and follow security best practices to protect your systems. see all python vulnerabilities.
Related topics