Critical (9.8)

PraisonAI RCE, no auth needed (CVE-2026-41497)

CVE-2026-41497

CVE-2026-41497: PraisonAI prior to 4.6.9 allows unauthenticated remote code execution via MCP command injection (CVSS 9.8). Update to 4.6.9 immediately.

Affected: Praison Praisonai

Patch now - CVE-2026-41497 is a critical remote code execution in PraisonAI multi-agent teams before version 4.6.9 that lets an unauthenticated attacker run arbitrary system commands on the server. Patched in version 4.6.9 - update immediately.

Overview

CVE-2026-41497 is an unauthenticated remote code execution vulnerability in PraisonAI, a multi-agent AI system framework. The flaw exists in the MCP (Model Context Protocol) command handler function parse_mcp_command(). When the vendor attempted to fix command handling, the patch failed to add a command allowlist or argument validation. This omission allows attackers to pass arbitrary executables such as bash, python, or /bin/sh with inline code execution flags directly into a subprocess execution call.

An attacker can exploit this by sending a specially crafted network request to the PraisonAI service. Since no authentication is required and the attack can be carried out over the network with low complexity, the vulnerability carries a CVSS score of 9.8 (Critical). There is no user interaction needed; the exploit is fully automated once the target is reached.

Affected Systems

Any deployment of PraisonAI prior to version 4.6.9 is vulnerable. Organizations using PraisonAI for AI agent orchestration, particularly those exposing the service on a network, should treat this as an immediate-priority patching item.

Impact

Successful exploitation grants the attacker the ability to execute arbitrary operating system commands on the underlying host. This can lead to:

  • Full server compromise
  • Data exfiltration of AI models, training data, and system secrets
  • Lateral movement into connected infrastructure
  • Persistent backdoor installation

Because the attack does not require authentication, internet-facing PraisonAI instances are at high risk of automated scanning and exploitation.

Remediation

The fix for this vulnerability is included in PraisonAI version 4.6.9. All users must upgrade to this release or later immediately. There are no effective workarounds; the vulnerability is in the core command parsing logic of MCP handling.

To upgrade:

  • Update the package via pip: pip install praisonai>=4.6.9
  • Rebuild container images if using Docker
  • Restart the service after upgrade

If you cannot upgrade immediately, consider placing PraisonAI behind a strict network firewall or WAF rule that blocks suspicious requests to the MCP endpoint.

Security Insight

This vulnerability follows a worrying pattern in the AI tooling space: rapid development at the cost of secure-by-default design. PraisonAI’s issue is fundamentally a missing allowlist - a security primitive that has been standard practice for decades. The fact that a high-severity RCE survived a prior security fix suggests the vendor’s development lifecycle lacks security regression testing. As AI agent systems become more integrated into enterprise workflows, vendors must adopt the same secure coding practices that have matured in traditional software. The AI SOC Agent Hype Masks Growing Secrets Sprawl Crisis underscores why trust-but-verify remains essential for AI infrastructure.

Further Reading

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Other Praison Praisonai Vulnerabilities

View all Praison Praisonai vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.