Cyber Posture

CVE-2026-39891

HighPublic PoCRCE

Published: 08 April 2026

Published
08 April 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 6.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-39891 is a high-severity Code Injection (CWE-94) vulnerability in Praison Praisonai. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires validation of user inputs from agent.start() to prevent template expressions from being executed as code during tool processing.

prevent

SI-2 mandates timely remediation of flaws like the unescaped input processing in create_agent_centric_tools(), as fixed in version 4.5.115.

prevent

SI-9 restricts malicious inputs containing template expressions to the tools like acp_create_file, preventing code injection exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.006 Python Execution
Adversaries may abuse Python commands and scripts for execution.
Why these techniques?

The code injection vulnerability (CWE-94) in the public-facing PraisonAI application directly enables exploitation of the app for initial access (T1190) and arbitrary code execution through Python template rendering (T1059.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

PraisonAI is a multi-agent teams system. Prior to 4.5.115, the create_agent_centric_tools() function returns tools (like acp_create_file) that process file content using template rendering. When user input from agent.start() is passed directly into these tools without escaping, template expressions in the…

more

input are executed rather than treated as literal text. This vulnerability is fixed in 4.5.115.

Deeper analysisAI

CVE-2026-39891 affects PraisonAI, a multi-agent teams system, in versions prior to 4.5.115. The vulnerability resides in the create_agent_centric_tools() function, which returns tools such as acp_create_file that process file content using template rendering. When user input from agent.start() is passed directly into these tools without escaping, template expressions within the input are executed as code rather than treated as literal text. This constitutes a CWE-94 (code injection) issue with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), published on 2026-04-08.

An attacker requires low privileges (PR:L) to exploit this over the network (AV:N) with low complexity and no user interaction. By supplying malicious input via agent.start() that includes template expressions, the attacker can trigger unintended code execution during tool processing, achieving high impacts on confidentiality, integrity, and availability.

The vulnerability is addressed in PraisonAI version 4.5.115. Additional details on mitigation and patches are available in the GitHub security advisory at https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-hwg5-x759-7wjg.

Details

CWE(s)

Affected Products

praison
praisonai
≤ 4.5.114

CVEs Like This One

CVE-2026-44334Same product: Praison Praisonai
CVE-2026-39888Same product: Praison Praisonai
CVE-2026-40158Same product: Praison Praisonai
CVE-2026-40156Same product: Praison Praisonai
CVE-2026-39890Same product: Praison Praisonai
CVE-2026-39889Same product: Praison Praisonai
CVE-2026-34934Same product: Praison Praisonai
CVE-2026-34952Same product: Praison Praisonai
CVE-2026-40315Same product: Praison Praisonai
CVE-2026-39308Same product: Praison Praisonai

References