CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Authentication Bypass in PraisonAI Legacy API Server Exploited Within Hours

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Within four hours of public disclosure, threat actors exploited CVE-2026-44338, an authentication bypass vulnerability in PraisonAI’s legacy Flask API server, to access sensitive endpoints without credentials. The flaw, affecting versions 2.5.6 through 4.6.33, stems from hard-coded authentication disablement (AUTH_ENABLED = False) and allows unauthenticated enumeration of configured agents and execution of agents.yaml workflows via /agents and /chat endpoints. Impact varies depending on the workflow’s permissions but includes quota exhaustion and exposure of PraisonAI.run() results. A patched version (4.6.34) is available. Exploitation activity was observed originating from IP 146.190.133[.]49 and using the User-Agent CVE-Detector/1.0.

Timeline

  1. 14.05.2026 14:40 1 articles · 2h ago

    Exploitation of PraisonAI Authentication Bypass Within Hours of Disclosure

    Threat actors exploited CVE-2026-44338 within approximately four hours of public disclosure. Automated scanning from 146.190.133[.]49 using the User-Agent CVE-Detector/1.0 probed exposed /agents endpoints and confirmed successful unauthenticated access, validating the bypass. No POST requests to /chat were observed during initial scans.

    Show sources

Information Snippets