PraisonAI is a multi-agent teams system. Prior to version 4.6.9, the fix for PraisonAI's MCP command handling does not add a command allowlist or argument validation to parse_mcp_command(), allowing arbitrary executables like bash, python, or /bin/sh with inline code execution flags to pass through to subprocess execution. This issue has been patched in version 4.6.9.
Metrics
Affected Vendors & Products
References
History
Fri, 08 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PraisonAI is a multi-agent teams system. Prior to version 4.6.9, the fix for PraisonAI's MCP command handling does not add a command allowlist or argument validation to parse_mcp_command(), allowing arbitrary executables like bash, python, or /bin/sh with inline code execution flags to pass through to subprocess execution. This issue has been patched in version 4.6.9. | |
| Title | Incomplete fix for CVE-2026-34935: Command Injection in MervinPraison/PraisonAI | |
| Weaknesses | CWE-77 CWE-78 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-08T14:47:27.656Z
Reserved: 2026-04-20T16:14:19.009Z
Link: CVE-2026-41497
Updated: 2026-05-08T14:46:46.723Z
Status : Awaiting Analysis
Published: 2026-05-08T14:16:33.843
Modified: 2026-05-08T15:53:24.863
Link: CVE-2026-41497
No data.
OpenCVE Enrichment
No data.