Home

Description

PraisonAI is a multi-agent teams system. Prior to version 4.6.9, the fix for PraisonAI's MCP command handling does not add a command allowlist or argument validation to parse_mcp_command(), allowing arbitrary executables like bash, python, or /bin/sh with inline code execution flags to pass through to subprocess execution. This issue has been patched in version 4.6.9.

PUBLISHED Reserved 2026-04-20 | Published 2026-05-08 | Updated 2026-05-08 | Assigner GitHub_M




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')

Product status

< 4.6.9
affected

References

github.com/...isonAI/security/advisories/GHSA-9qhq-v63v-fv3j exploit

github.com/...isonAI/security/advisories/GHSA-9qhq-v63v-fv3j

github.com/...ommit/47bff65413beaa3c21bf633c1fae4e684348368c

cve.org (CVE-2026-41497)

nvd.nist.gov (CVE-2026-41497)

Download JSON