CVE-2026-34935 PUBLISHED

PraisonAI: OS Command Injection in MCPHandler.parse_mcp_command()

Assigner: GitHub_M
Reserved: 31.03.2026 Published: 03.04.2026 Updated: 03.04.2026

PraisonAI is a multi-agent teams system. From version 4.5.15 to before version 4.5.69, the --mcp CLI argument is passed directly to shlex.split() and forwarded through the call chain to anyio.open_process() with no validation, allowlist check, or sanitization at any hop, allowing arbitrary OS command execution as the process user. This issue has been patched in version 4.5.69.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 9.8

Product Status

Vendor MervinPraison
Product PraisonAI
Versions
  • Version >= 4.5.15, < 4.5.69 is affected

References

Problem Types

  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE