PraisonAI RCE, no auth needed (CVE-2026-41497)
CVE-2026-41497
CVE-2026-41497: PraisonAI prior to 4.6.9 allows unauthenticated remote code execution via MCP command injection (CVSS 9.8). Update to 4.6.9 immediately.
Patch now - CVE-2026-41497 is a critical remote code execution in PraisonAI multi-agent teams before version 4.6.9 that lets an unauthenticated attacker run arbitrary system commands on the server. Patched in version 4.6.9 - update immediately.
Overview
CVE-2026-41497 is an unauthenticated remote code execution vulnerability in PraisonAI, a multi-agent AI system framework. The flaw exists in the MCP (Model Context Protocol) command handler function parse_mcp_command(). When the vendor attempted to fix command handling, the patch failed to add a command allowlist or argument validation. This omission allows attackers to pass arbitrary executables such as bash, python, or /bin/sh with inline code execution flags directly into a subprocess execution call.
An attacker can exploit this by sending a specially crafted network request to the PraisonAI service. Since no authentication is required and the attack can be carried out over the network with low complexity, the vulnerability carries a CVSS score of 9.8 (Critical). There is no user interaction needed; the exploit is fully automated once the target is reached.
Affected Systems
Any deployment of PraisonAI prior to version 4.6.9 is vulnerable. Organizations using PraisonAI for AI agent orchestration, particularly those exposing the service on a network, should treat this as an immediate-priority patching item.
Impact
Successful exploitation grants the attacker the ability to execute arbitrary operating system commands on the underlying host. This can lead to:
- Full server compromise
- Data exfiltration of AI models, training data, and system secrets
- Lateral movement into connected infrastructure
- Persistent backdoor installation
Because the attack does not require authentication, internet-facing PraisonAI instances are at high risk of automated scanning and exploitation.
Remediation
The fix for this vulnerability is included in PraisonAI version 4.6.9. All users must upgrade to this release or later immediately. There are no effective workarounds; the vulnerability is in the core command parsing logic of MCP handling.
To upgrade:
- Update the package via pip:
pip install praisonai>=4.6.9 - Rebuild container images if using Docker
- Restart the service after upgrade
If you cannot upgrade immediately, consider placing PraisonAI behind a strict network firewall or WAF rule that blocks suspicious requests to the MCP endpoint.
Security Insight
This vulnerability follows a worrying pattern in the AI tooling space: rapid development at the cost of secure-by-default design. PraisonAI’s issue is fundamentally a missing allowlist - a security primitive that has been standard practice for decades. The fact that a high-severity RCE survived a prior security fix suggests the vendor’s development lifecycle lacks security regression testing. As AI agent systems become more integrated into enterprise workflows, vendors must adopt the same secure coding practices that have matured in traditional software. The AI SOC Agent Hype Masks Growing Secrets Sprawl Crisis underscores why trust-but-verify remains essential for AI infrastructure.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
PraisonAI is a multi-agent teams system. Prior to version 4.6.34, PraisonAI's MCP (Model Context Protocol) server (praisonai mcp serve) registers four file-handling tools by default — praisonai.rules....
electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. Prior to version 3.3.8, a command injection vulnerability exists in github.com/elcterm/electerm/npm/install.js...
electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. Prior to version 3.3.8, a command injection vulnerability exists in github.com/elcterm/electerm/npm/install.js...
Improper neutralization of special elements used in a command ('command injection') in Azure Cloud Shell allows an unauthorized attacker to perform spoofing over a network....