Critical (9.8)

PraisonAI SSRF via URL bypass (CVE-2026-44335)

CVE-2026-44335

CVE-2026-44335: Critical SSRF in PraisonAI pre-1.6.32 lets attackers bypass URL checks to scan internal networks. Update to version 1.6.32 immediately.

Affected: Praison Praisonaiagents

Patch now - CVE-2026-44335 is a critical server-side request forgery vulnerability in PraisonAI multi-agent teams prior to version 1.6.32 that allows unauthenticated attackers to bypass URL checking logic and probe internal network resources. Patched in version 1.6.32 - update all deployments now.

Overview

CVE-2026-44335 affects PraisonAI, an open-source multi-agent teams framework designed for building AI-powered automation workflows. The vulnerability resides in the URL validation logic used by the application to restrict which external resources agents can access. Due to a logical flaw in how URLs are parsed and checked, an attacker can craft requests that bypass the intended restrictions.

The CVSS score of 9.8 (Critical) reflects the low attack complexity, no authentication requirements, and no user interaction needed to exploit this flaw. Attackers can send specially crafted HTTP requests that appear to target allowed destinations but actually reach internal network addresses, cloud metadata endpoints, or other sensitive services behind the firewall.

What This Means in Practice

An unauthenticated attacker with network access to a PraisonAI instance can exploit this SSRF to:

  • Scan internal IP ranges and discover services running on the internal network
  • Access cloud provider metadata endpoints (e.g., AWS 169.254.169.254), potentially retrieving IAM credentials
  • Read files from internal servers or communicate with databases and internal APIs
  • Use the PraisonAI server as a proxy to attack other internal systems

This is especially dangerous in cloud deployments where SSRF can lead to cloud credential theft, enabling lateral movement across the entire cloud environment.

Affected Versions

  • PraisonAI: All versions prior to 1.6.32 are vulnerable
  • Patched version: PraisonAI 1.6.32

Remediation

Organizations using PraisonAI must take immediate action:

  1. Patch Now: Upgrade to PraisonAI version 1.6.32 or later. The patch fixes the URL validation logic to prevent the bypass.
  2. Network Segmentation: Restrict outbound connectivity from PraisonAI instances to only necessary services.
  3. Monitor Logs: Review server logs for unusual URL patterns, especially requests to internal IP ranges or cloud metadata endpoints.
  4. Cloud Metadata Protection: If running in cloud environments, enable instance metadata service v2 (IMDSv2) with hop count restrictions to limit SSRF impact.

Security Insight

This vulnerability highlights a recurring pattern in AI agent frameworks: as developers rush to ship agentic capabilities-URL fetching, API integrations, tool-use-they often overlook fundamental security controls like input validation and outbound request filtering. The PraisonAI SSRF fits a broader trend where agent orchestration layers become prime targets because they inherit both network access and the ability to execute actions. Organizations deploying AI agents should treat each agent’s external connectivity as a privileged capability requiring the same scrutiny as a production API gateway, not as a convenience feature.

Further Reading

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.