High severity8.6NVD Advisory· Published Apr 3, 2026· Updated Apr 13, 2026
CVE-2026-34954
CVE-2026-34954
Description
PraisonAI is a multi-agent teams system. Prior to version 1.5.95, FileTools.download_file() in praisonaiagents validates the destination path but performs no validation on the url parameter, passing it directly to httpx.stream() with follow_redirects=True. An attacker who controls the URL can reach any host accessible from the server including cloud metadata services and internal network services. This issue has been patched in version 1.5.95.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
praisonaiagentsPyPI | < 1.5.95 | 1.5.95 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/MervinPraison/PraisonAI/security/advisories/GHSA-44c2-3rw4-5gvhnvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-44c2-3rw4-5gvhghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-34954ghsaADVISORY
News mentions
0No linked articles in our index yet.