Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9qhq-v63v-fv3j | PraisonAI has an incomplete fix for CVE-2026-34935 - OS Command Injection |
Fri, 08 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Praison
Praison praisonai |
|
| CPEs | cpe:2.3:a:praison:praisonai:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Praison
Praison praisonai |
Fri, 08 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PraisonAI is a multi-agent teams system. Prior to version 4.6.9, the fix for PraisonAI's MCP command handling does not add a command allowlist or argument validation to parse_mcp_command(), allowing arbitrary executables like bash, python, or /bin/sh with inline code execution flags to pass through to subprocess execution. This issue has been patched in version 4.6.9. | |
| Title | Incomplete fix for CVE-2026-34935: Command Injection in MervinPraison/PraisonAI | |
| Weaknesses | CWE-77 CWE-78 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-08T14:47:27.656Z
Reserved: 2026-04-20T16:14:19.009Z
Link: CVE-2026-41497
Updated: 2026-05-08T14:46:46.723Z
Status : Analyzed
Published: 2026-05-08T14:16:33.843
Modified: 2026-05-08T19:10:22.173
Link: CVE-2026-41497
No data.
OpenCVE Enrichment
Updated: 2026-05-08T22:45:05Z
Github GHSA