High severity7.7NVD Advisory· Published Apr 3, 2026· Updated Apr 14, 2026
CVE-2026-34936
CVE-2026-34936
Description
PraisonAI is a multi-agent teams system. Prior to version 4.5.90, passthrough() and apassthrough() in praisonai accept a caller-controlled api_base parameter that is concatenated with endpoint and passed directly to httpx.Client.request() when the litellm primary path raises AttributeError. No URL scheme validation, private IP filtering, or domain allowlist is applied, allowing requests to any host reachable from the server. This issue has been patched in version 4.5.90.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
praisonaiPyPI | < 4.5.90 | 4.5.90 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/MervinPraison/PraisonAI/security/advisories/GHSA-x6m9-gxvr-7jpvnvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-x6m9-gxvr-7jpvghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-34936ghsaADVISORY
News mentions
0No linked articles in our index yet.