CVE-2026-44338: PraisonAI Flask API Lacks Default Authentication
The National Vulnerability Database has disclosed CVE-2026-44338, a high-severity vulnerability (CVSS 7.3) affecting PraisonAI, a multi-agent teams system. Versions 2.5.6 through to 4.6.33 ship with a legacy Flask API server that has authentication disabled by default. This is a critical oversight.
Attackers who can reach this exposed Flask API can access the /agents endpoint and trigger configured workflows via /chat without any authentication token. This bypass allows unauthorized access and control over the AI agents, leading to potential data manipulation, exfiltration, or denial of service through arbitrary agent execution. The vulnerability is categorized under CWE-306 (Missing Authentication for Critical Function), CWE-668 (Exposure of Resource to Wrong Sphere), and CWE-1188 (Insecure Default Initialization of Resource).
Defenders must understand that ‘disabled by default’ often means ‘forgotten and left exposed’ in production environments. This isn’t theoretical; it’s a direct path for attackers. PraisonAI has addressed this in version 4.6.34, and immediate patching is required to close this glaring hole.
What This Means For You
- If your organization uses PraisonAI, check your version immediately. Any deployment running PraisonAI versions 2.5.6 to 4.6.33 is vulnerable. Prioritize patching to version 4.6.34 or later. Furthermore, audit your network configurations to ensure this Flask API server is not publicly exposed, regardless of version. An unauthenticated API is a red alert for any CISO.
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-44338 | Auth Bypass | PraisonAI versions 2.5.6 to 4.6.33 |
| CVE-2026-44338 | Auth Bypass | PraisonAI legacy Flask API server with authentication disabled |
| CVE-2026-44338 | Auth Bypass | Access to /agents endpoint without authentication in PraisonAI |
| CVE-2026-44338 | Auth Bypass | Triggering agents.yaml workflow via /chat endpoint without authentication in PraisonAI |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 08, 2026 at 17:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.