PraisonAI CLI Argument RCE (CVE-2026-34935)
CVE-2026-34935
PraisonAI is a multi-agent teams system. From version 4.5.15 to before version 4.5.69, the --mcp CLI argument is passed directly to shlex.split() and forwarded through the call chain to anyio.open_pro...
Overview
A critical command injection vulnerability, CVE-2026-34935, has been identified in the PraisonAI multi-agent teams system. The flaw allows remote, unauthenticated attackers to execute arbitrary operating system commands on the host running the vulnerable software.
Vulnerability Details
The vulnerability resides in how PraisonAI handles the --mcp command-line interface (CLI) argument. In affected versions (4.5.15 through 4.5.68), this user-supplied input is passed directly to the shlex.split() function and then forwarded to anyio.open_process() without any validation, sanitization, or allowlist checks. This lack of input filtering creates a direct path for an attacker to inject and execute malicious commands with the privileges of the PraisonAI process.
Impact
With a maximum CVSS score of 9.8, this vulnerability is highly severe. Attackers exploiting this flaw can achieve full command execution on the target system. This could lead to complete system compromise, data theft, deployment of ransomware, or the use of the server as a foothold for lateral movement within a network. The network attack vector with no required privileges or user interaction makes this flaw particularly dangerous for exposed instances.
Affected Versions
PraisonAI versions starting from 4.5.15 up to, but not including, version 4.5.69 are vulnerable.
Remediation and Mitigation
The primary and immediate action is to upgrade PraisonAI to version 4.5.69 or later, which contains the necessary validation to patch this vulnerability.
Immediate Actions:
- Upgrade: Update all instances of PraisonAI to version 4.5.69 or the latest available version.
- Inventory: Identify all systems running PraisonAI, especially those accessible from untrusted networks.
- Restrict Access: As a temporary measure if patching is delayed, ensure PraisonAI services are not exposed to the public internet and are behind strict network access controls.
Until the patch is applied, treat any system running a vulnerable version as potentially compromised and monitor it for anomalous activity.
Security Insight
This vulnerability highlights a persistent class of flaw in AI/ML tooling where powerful system-level capabilities are exposed without robust input validation, echoing past incidents in other DevOps and automation platforms. The direct passthrough of CLI arguments to process execution is a foundational security failure, suggesting that rapid feature development in emerging AI orchestration tools may be outpacing secure coding practices. As seen with the adoption of tools like CyberStrikeAI by threat actors, the integration of AI systems into critical workflows makes them high-value targets, amplifying the impact of such basic vulnerabilities.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.8 may allow attacker to execute unauthorized code ...
Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in authentication helper execution where helper configuration values are executed using shell=true without ...
node-tesseract-ocr is an npm package that provides a Node.js wrapper for Tesseract OCR. In all versions through 2.2.1, the recognize() function in src/index.js is vulnerable to OS Command Injection. T...
Improper neutralization of special elements used in an os command ('os command injection') in Microsoft Bing Images allows an unauthorized attacker to execute code over a network....