Cyber Posture

CVE-2026-34938

CriticalPublic PoC

Published: 03 April 2026

Published
03 April 2026
Modified
14 April 2026
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0005 15.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-34938 is a critical-severity Protection Mechanism Failure (CWE-693) vulnerability in Praison Praisonaiagents. Its CVSS base score is 10.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 15.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SC-39 (Process Isolation) and SC-44 (Detonation Chambers).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely remediation of identified flaws, such as the sandbox bypass in execute_code(), to prevent arbitrary OS command execution on the host.

preventdetect

Provides detonation chambers for isolated execution and monitoring of potentially malicious code like attacker-controlled Python, preventing sandbox escapes to the host.

prevent

Enforces process isolation to confine untrusted code execution within secure domains, mitigating bypasses that allow host OS command execution.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.006 Python Execution
Adversaries may abuse Python commands and scripts for execution.
Why these techniques?

Remote unauthenticated sandbox bypass in a network-accessible Python-based application enables exploitation of a public-facing application (T1190) leading to arbitrary code execution via Python interpreter (T1059.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

PraisonAI is a multi-agent teams system. Prior to version 1.5.90, execute_code() in praisonai-agents runs attacker-controlled Python inside a three-layer sandbox that can be fully bypassed by passing a str subclass with an overridden startswith() method to the _safe_getattr wrapper, achieving…

more

arbitrary OS command execution on the host. This issue has been patched in version 1.5.90.

Deeper analysisAI

CVE-2026-34938 is a critical sandbox bypass vulnerability in PraisonAI, a multi-agent teams system. Prior to version 1.5.90, the execute_code() function in the praisonai-agents component executes attacker-controlled Python code within a three-layer sandbox. This protection can be fully circumvented by passing a string subclass with an overridden startswith() method to the _safe_getattr wrapper, resulting in arbitrary OS command execution on the host system. The vulnerability is associated with CWE-693 and carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).

A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required. By crafting malicious input that triggers the sandbox bypass, the attacker achieves full remote code execution on the host, potentially compromising confidentiality, integrity, and availability across the affected scope.

The vulnerability has been patched in PraisonAI version 1.5.90. Additional details on the issue and remediation are available in the GitHub security advisory at https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-6vh2-h83c-9294.

Details

CWE(s)

Affected Products

praison
praisonaiagents
≤ 1.5.90

CVEs Like This One

CVE-2026-34954Same product: Praison Praisonaiagents
CVE-2026-44335Same product: Praison Praisonaiagents
CVE-2026-34937Same product: Praison Praisonaiagents
CVE-2026-40153Same product: Praison Praisonaiagents
CVE-2026-40111Same product: Praison Praisonaiagents
CVE-2026-40288Same product: Praison Praisonaiagents
CVE-2026-39888Same vendor: Praison
CVE-2026-40117Same product: Praison Praisonaiagents
CVE-2026-40150Same product: Praison Praisonaiagents
CVE-2026-40287Same product: Praison Praisonaiagents

References