UNKNOWNCVE-2026-34938

PraisonAI: Python Sandbox Escape via str Subclass startswith() Override in execute_code

Platform

python

Component

praisonai-agents

Fixed in

1.5.90

PraisonAI is a multi-agent teams system. Prior to version 1.5.90, execute_code() in praisonai-agents runs attacker-controlled Python inside a three-layer sandbox that can be fully bypassed by passing a str subclass with an overridden startswith() method to the _safe_getattr wrapper, achieving arbitrary OS command execution on the host. This issue has been patched in version 1.5.90.

How to fix

Actualice la biblioteca praisonai-agents a la versión 1.5.90 o superior. Esto corrige la vulnerabilidad de escape de sandbox en la función execute_code().

Monitor your dependencies automatically

Get notified when new vulnerabilities affect your projects. Free forever.

Start free
CVE-2026-34938 — Vulnerability Details | NextGuard | NextGuard