CVE-2026-34934
PraisonAI · PraisonAI
PraisonAI prior to 4.5.90 is vulnerable to SQL injection in the get_all_user_threads function. Attackers can gain full database access by injecting malicious payloads into thread IDs.
Executive summary
PraisonAI contains a critical SQL injection vulnerability that allows attackers to execute arbitrary database queries and gain full access to sensitive stored data.
Vulnerability
The get_all_user_threads function constructs raw SQL queries using f-strings with unescaped thread IDs. An attacker can store a malicious payload in a thread ID via the update_thread function, which is then executed when the application attempts to load the thread list.
Business impact
This vulnerability allows for the complete compromise of the application's database. Attackers can read, modify, or delete all stored data, including user credentials and proprietary AI training data. The CVSS score of 9.8 reflects the high probability of total data loss and unauthorized administrative access.
Remediation
Immediate Action: Update PraisonAI to version 4.5.90 or later to implement parameterized queries and proper input sanitization.
Proactive Monitoring: Monitor database logs for unusual query patterns, such as those containing unexpected SQL keywords (e.g., UNION, SELECT, SLEEP) in the thread ID fields.
Compensating Controls: Deploy a WAF with SQL injection protection rules to detect and block malicious payloads in application requests.
Exploitation status
Public Exploit Available: false
Analyst recommendation
SQL injection remains one of the most damaging web vulnerabilities. Given the 9.8 severity, it is critical to apply the update to version 4.5.90 immediately. Organizations should also conduct a database audit to ensure no unauthorized data exfiltration has occurred prior to patching.