Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6vh2-h83c-9294 | PraisonAI: Python Sandbox Escape via str Subclass startswith() Override in execute_code |
Tue, 14 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Praison
Praison praisonaiagents |
|
| CPEs | cpe:2.3:a:praison:praisonaiagents:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Praison
Praison praisonaiagents |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mervinpraison
Mervinpraison praisonai |
|
| Vendors & Products |
Mervinpraison
Mervinpraison praisonai |
Mon, 06 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 04 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PraisonAI is a multi-agent teams system. Prior to version 1.5.90, execute_code() in praisonai-agents runs attacker-controlled Python inside a three-layer sandbox that can be fully bypassed by passing a str subclass with an overridden startswith() method to the _safe_getattr wrapper, achieving arbitrary OS command execution on the host. This issue has been patched in version 1.5.90. | |
| Title | PraisonAI: Python Sandbox Escape via str Subclass startswith() Override in execute_code | |
| Weaknesses | CWE-693 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-06T13:23:42.009Z
Reserved: 2026-03-31T17:27:08.660Z
Link: CVE-2026-34938
Updated: 2026-04-06T13:23:37.844Z
Status : Analyzed
Published: 2026-04-03T23:17:06.170
Modified: 2026-04-14T18:07:19.827
Link: CVE-2026-34938
No data.
OpenCVE Enrichment
Updated: 2026-04-15T16:30:09Z
Github GHSA