CVE-2026-44338
HIGH
7,3
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: low
Availability: low
Description
AI Translation Available
PraisonAI is a multi-agent teams system. From version 2.5.6 to before version 4.6.34, PraisonAI ships a legacy Flask API server with authentication disabled by default. When that server is used, any caller that can reach it can access /agents and trigger the configured agents.yaml workflow through /chat without providing a token. This issue has been patched in version 4.6.34.
306
Missing Authentication for Critical Function
DraftCommon Consequences
Security Scopes Affected:
Access Control
Other
Potential Impacts:
Gain Privileges Or Assume Identity
Varies By Context
Applicable Platforms
Technologies:
Cloud Computing, ICS/OT
668
Exposure of Resource to Wrong Sphere
DraftCommon Consequences
Security Scopes Affected:
Confidentiality
Integrity
Other
Potential Impacts:
Read Application Data
Modify Application Data
Varies By Context
Applicable Platforms
All platforms may be affected
1188
Initialization of a Resource with an Insecure Default
IncompleteCommon Consequences
Security Scopes Affected:
Other
Potential Impacts:
Varies By Context
Applicable Platforms
All platforms may be affected
Application
Praisonai by Praison
Version Range Affected
From
2.5.6
(inclusive)
To
4.6.34
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:praison:praisonai:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-6rmh-7xcm-c…
https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-6rmh-7xcm-c…