<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-34937 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-34937/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 03 Apr 2026 23:17:06 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-34937/feed.xml" rel="self" type="application/rss+xml"/><item><title>PraisonAI OS Command Injection Vulnerability (CVE-2026-34937)</title><link>https://feed.craftedsignal.io/briefs/2026-04-praisonai-os-command-injection/</link><pubDate>Fri, 03 Apr 2026 23:17:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-praisonai-os-command-injection/</guid><description>PraisonAI versions prior to 1.5.90 are vulnerable to OS Command Injection (CVE-2026-34937) due to insufficient escaping in the run_python() function, allowing arbitrary OS command execution via shell interpolation.</description><content:encoded><![CDATA[<p>PraisonAI, a multi-agent teams system, is susceptible to an OS command injection vulnerability affecting versions prior to 1.5.90. The vulnerability, identified as CVE-2026-34937, stems from the <code>run_python()</code> function&rsquo;s construction of shell command strings. This function interpolates user-controlled code into a <code>python3 -c &quot;&lt;code&gt;&quot;</code> command and executes it using <code>subprocess.run(..., shell=True)</code>. The inadequate escaping logic, specifically the failure to escape <code>$()</code> and backtick substitutions, enables arbitrary OS command execution prior to Python&rsquo;s invocation. Users of PraisonAI are urged to upgrade to version 1.5.90 or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an instance of PraisonAI running a version prior to 1.5.90.</li>
<li>The attacker crafts malicious code containing OS command injection payloads using <code>$()</code> or backticks.</li>
<li>The attacker injects the malicious code into a parameter or input field that is processed by the <code>run_python()</code> function.</li>
<li>The <code>run_python()</code> function constructs the shell command string, interpolating the attacker&rsquo;s malicious code without proper escaping.</li>
<li>The <code>subprocess.run()</code> function executes the crafted shell command with <code>shell=True</code>.</li>
<li>The attacker&rsquo;s OS command is executed on the host system with the privileges of the PraisonAI application.</li>
<li>The attacker gains unauthorized access to the system, potentially enabling data exfiltration, system modification, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-34937) allows an attacker to execute arbitrary OS commands on the system running PraisonAI. This could lead to complete system compromise, data breaches, or denial of service. The severity is high because it allows unauthenticated or low-privileged users to gain complete control of the system. Organizations using affected versions of PraisonAI are at risk of significant data loss and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade PraisonAI to version 1.5.90 or later to patch CVE-2026-34937.</li>
<li>Deploy the Sigma rule &ldquo;Detect PraisonAI OS Command Injection Attempt&rdquo; to your SIEM to identify potential exploitation attempts.</li>
<li>Monitor process creation events for the execution of unexpected processes originating from the PraisonAI application to detect post-exploitation activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-34937</category><category>os command injection</category><category>praisonai</category></item></channel></rss>