CVE-2026-34955

HIGH

PraisonAI: Sandbox Escape via shell=True and Bypassable Blocklist in SubprocessSandbox

Title source: cna
STIX 2.1

Description

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, SubprocessSandbox in all modes (BASIC, STRICT, NETWORK_ISOLATED) calls subprocess.run() with shell=True and relies solely on string-pattern matching to block dangerous commands. The blocklist does not include sh or bash as standalone executables, allowing trivial sandbox escape in STRICT mode via sh -c '<command>'. This issue has been patched in version 4.5.97.

Scores

CVSS v3 8.8
EPSS 0.0001
EPSS Percentile 2.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-78
Status published
Products (3)
MervinPraison/PraisonAI < 4.5.97
praison/praisonai < 4.5.97
pypi/praisonai 0 - 4.5.97PyPI
Published Apr 04, 2026
Tracked Since Apr 04, 2026