CVE-2026-44334 POC (Proof-of-Concept)

CVE-2026-44334 POC (Proof-of-Concept)

PraisonAI is a multi-agent teams system. From version 4.5.139 to before version 4.6.32, CVE-2026-40287's fix gated tools.py auto-import behind PRAISONAI_ALLOW_LOCAL_TOOLS=true in two files (tool_resolver.py, api/call.py). A third import sink in praisonai/templates/tool_override.py was missed and remains unguarded. It is reached by the recipe runner on every recipe execution and is remotely triggerable through POST /v1/recipes/run with a recipe value pointing at any local absolute path or any GitHub repo (because SecurityConfig.allow_any_github defaults to True). The attacker drops a tools.py next to TEMPLATE.yaml, the server exec_module()s it. No auth required by default, no environment opt-in required. This issue has been patched in version 4.6.32.

Published: 2026-05-08

CVSS: 8.4

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Download CVE-2026-44334 POC (Proof-of-Concept) here:

Tip: Download official Tor Browser at https://www.torproject.org/download/ to access .onion links.

https://hokyo.gr/poc-157-cve-2026-6963/

https://hokyo.gr/poc-548-cve-2026-20185/

https://hokyo.gr/poc-565-cve-2026-41938/

Copyright 2017- 2025 Hokyo JapanEats ©