PraisonAI Vulnerability Allows Undeclared Tool Invocation (CVE-2026-44339)

PraisonAI Vulnerability Allows Undeclared Tool Invocation (CVE-2026-44339)

A critical vulnerability, CVE-2026-44339, has been identified in PraisonAI’s multi-agent teams system, specifically affecting versions prior to 4.6.37 of praisonai and 1.6.37 of praisonaiagents. According to the National Vulnerability Database, the praisonaiagents component incorrectly attempts to resolve undeclared tool names against module globals and __main__ when its standard tool matching fails. This design flaw, coupled with a default agent configuration where _perm_allow is None, means that non-dangerous, undeclared tool names are not blocked by the system’s permission gate.

This oversight creates a significant attack vector. An attacker capable of influencing tool-call names can exploit this to invoke application callables that were never explicitly declared as tools. The National Vulnerability Database rates this with a CVSS score of 8.6 (HIGH), highlighting the severity of the issue, which could lead to unintended execution of code. The vulnerability is categorized under CWE-470, indicating an improper release of system resources or privileges.

Patches addressing this issue have been released in praisonai version 4.6.37 and praisonaiagents version 1.6.37. Organizations leveraging PraisonAI’s multi-agent systems must prioritize these updates immediately to mitigate the risk of unauthorized command execution. The attacker’s calculus here is straightforward: find a way to inject or manipulate tool-call names, and you gain an unauthorized execution primitive.

What This Means For You

  • If your organization uses PraisonAI, you need to verify your `praisonai` and `praisonaiagents` versions immediately. Specifically, check if you are running `praisonai` prior to 4.6.37 or `praisonaiagents` prior to 1.6.37. Patch to the latest versions (4.6.37 and 1.6.37, respectively) to prevent attackers from invoking undeclared application callables.

Indicators of Compromise

IDTypeIndicator
CVE-2026-44339 Code Injection PraisonAI praisonaiagents < 1.6.37
CVE-2026-44339 Code Injection PraisonAI praisonai < 4.6.37
CVE-2026-44339 Code Injection Vulnerable component: praisonaiagents tool-call name resolution
CVE-2026-44339 Misconfiguration Default agent configuration where _perm_allow is None
🔎
PraisonAI Vulnerability Intel Use /brief to get an analyst-ready weekly threat summary with severity rankings and key IOCs.
Open Intel Bot →
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 08, 2026 at 17:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-6667 — PgBouncer before 1.25.2 did not perform an appropriate

CVE-2026-6667 — PgBouncer before 1.25.2 did not perform an appropriate authorization check for the KILL_CLIENT admin command. All users with access to the administration console...

vulnerabilityCVEmedium-severitycwe-862
/SCW Vulnerability Desk /MEDIUM /4.3 /⚑ 2 IOCs /⚙ 2 Sigma

CVE-2026-6666 — A possible null pointer reference in PgBouncer before

CVE-2026-6666 — A possible null pointer reference in PgBouncer before 1.25.2 could lead to a crash, if a server sends an error response without SQLSTATE...

vulnerabilityCVEmedium-severitycwe-476
/SCW Vulnerability Desk /MEDIUM /5.9 /⚑ 2 IOCs /⚙ 1 Sigma

PgBouncer SCRAM Vulnerability (CVE-2026-6665) Allows Stack Overflow

CVE-2026-6665 — The SCRAM code in PgBouncer before 1.25.2 did not check the return value of strlcat() correctly when building the contents of the SCRAM...

vulnerabilityCVEhigh-severitycwe-121
/SCW Vulnerability Desk /HIGH /8.1 /⚑ 4 IOCs /⚙ 2 Sigma