CVE-2026-34937
EUVD-2026-1891703.04.2026, 23:17
PraisonAI is a multi-agent teams system. Prior to version 1.5.90, run_python() in praisonai constructs a shell command string by interpolating user-controlled code into python3 -c "<code>" and passing it to subprocess.run(..., shell=True). The escaping logic only handles \ and ", leaving $() and backtick substitutions unescaped, allowing arbitrary OS command execution before Python is invoked. This issue has been patched in version 1.5.90.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| praison | praisonaiagents | 𝑥 < 1.5.90 |
𝑥
= Vulnerable software versions