CVE-2026-40088 PUBLISHED

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in praisonai

Assigner: GitHub_M
Reserved: 09.04.2026 Published: 09.04.2026 Updated: 09.04.2026

PraisonAI is a multi-agent teams system. Prior to 4.5.121, the execute_command function and workflow shell execution are exposed to user-controlled input via agent workflows, YAML definitions, and LLM-generated tool calls, allowing attackers to inject arbitrary shell commands through shell metacharacters. This vulnerability is fixed in 4.5.121.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CVSS Score: 9.7

Product Status

Vendor MervinPraison
Product PraisonAI
Versions
  • Version < 4.5.121 is affected

References

Problem Types

  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE