CVE-2026-44338
Analyzed Analyzed - Analysis Complete
PraisonAI Multiple Agent Workflows Unauthenticated Access

Publication date: 2026-05-08

Last updated on: 2026-05-08

Assigner: GitHub, Inc.

Description
PraisonAI is a multi-agent teams system. From version 2.5.6 to before version 4.6.34, PraisonAI ships a legacy Flask API server with authentication disabled by default. When that server is used, any caller that can reach it can access /agents and trigger the configured agents.yaml workflow through /chat without providing a token. This issue has been patched in version 4.6.34.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-08
Last Modified
2026-05-08
Generated
2026-05-09
AI Q&A
2026-05-08
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
praison praisonai From 2.5.6 (inc) to 4.6.34 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
CWE-668 The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
CWE-1188 The product initializes or sets a resource with a default that is intended to be changed by the product's installer, administrator, or maintainer, but the default is not secure.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

PraisonAI includes a legacy Flask API server that is shipped with authentication disabled by default in versions from 2.5.6 up to before 4.6.34. This means that anyone who can reach the server can access certain endpoints like /agents and /chat without providing any authentication token.

The /agents endpoint returns metadata about configured agents, while the /chat endpoint allows triggering workflows defined in the agents.yaml file. Because authentication is disabled by default (with hard-coded settings AUTH_ENABLED = False and AUTH_TOKEN = None), these endpoints are accessible to unauthenticated users.

An attacker can exploit this vulnerability to enumerate agents, trigger workflows, consume system resources, or access workflow results without authorization. This issue has been patched in version 4.6.34.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the legacy Flask API server is running and accessible without authentication on port 8080. Specifically, you can test if the endpoints /agents and /chat are reachable and respond without requiring a token.

  • Use a network scanning tool like nmap to check if port 8080 is open: nmap -p 8080 <target-ip>
  • Use curl or a similar HTTP client to test the /agents endpoint for unauthenticated access: curl http://<target-ip>:8080/agents
  • Use curl to test the /chat endpoint to see if workflows can be triggered without authentication: curl -X POST http://<target-ip>:8080/chat -d '{"input": "test"}' -H 'Content-Type: application/json'

If these endpoints respond successfully without requiring authentication tokens, the system is vulnerable.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade PraisonAI to version 4.6.34 or later, where the authentication issue has been patched.

If upgrading is not immediately possible, restrict network access to the API server on port 8080 to trusted hosts only, preventing unauthorized external access.

Additionally, review and modify the api_server.py configuration to enable authentication by setting AUTH_ENABLED to True and configuring a valid AUTH_TOKEN.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing unauthorized users to access and interact with the PraisonAI system without any authentication.

  • Confidentiality impact: Attackers can access metadata about agents and potentially sensitive workflow results.
  • Integrity impact: Attackers can trigger workflows unconditionally, potentially altering system state or data.
  • Availability impact: Attackers can consume system resources by repeatedly triggering workflows, potentially leading to denial of service.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in PraisonAI allows unauthenticated access to sensitive API endpoints, enabling attackers to enumerate agents, trigger workflows, and access workflow results without authorization.

This unauthorized access can lead to confidentiality, integrity, and availability impacts, which may result in exposure or manipulation of sensitive data.

Such security weaknesses could potentially violate compliance requirements under common standards and regulations like GDPR and HIPAA, which mandate protection of sensitive data and controlled access.

Therefore, organizations using affected versions of PraisonAI might face compliance risks if the vulnerability is exploited, as it undermines the necessary security controls to protect personal or sensitive information.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart