UNKNOWNCVE-2026-34938
PraisonAI: Python Sandbox Escape via str Subclass startswith() Override in execute_code
Platform
python
Component
praisonai-agents
Fixed in
1.5.90
PraisonAI is a multi-agent teams system. Prior to version 1.5.90, execute_code() in praisonai-agents runs attacker-controlled Python inside a three-layer sandbox that can be fully bypassed by passing a str subclass with an overridden startswith() method to the _safe_getattr wrapper, achieving arbitrary OS command execution on the host. This issue has been patched in version 1.5.90.
How to fix
Actualice la biblioteca praisonai-agents a la versión 1.5.90 o superior. Esto corrige la vulnerabilidad de escape de sandbox en la función execute_code().
Monitor your dependencies automatically
Get notified when new vulnerabilities affect your projects. Free forever.
Start free