CVE-2026-39890

PraisonAI · PraisonAI

PraisonAI versions prior to 4.5.115 are vulnerable to RCE via insecure YAML parsing, allowing execution of arbitrary JavaScript.

Executive summary

A critical Remote Code Execution vulnerability in PraisonAI allows attackers to execute arbitrary JavaScript by uploading malicious YAML files.

Vulnerability

The AgentService.loadAgentFromFile method uses the js-yaml library to parse YAML without disabling dangerous tags. This allows an attacker to inject and execute arbitrary JavaScript during the parsing process.

Business impact

Successful exploitation leads to Remote Code Execution on the server. This allows an attacker to compromise the entire system, access sensitive internal data, and potentially pivot into other parts of the infrastructure, as reflected by the 9.8 CVSS score.

Remediation

Immediate Action: Upgrade PraisonAI to version 4.5.115 or later immediately to patch the insecure YAML parsing.

Proactive Monitoring: Review API logs for uploads of suspicious YAML files and monitor for anomalous JavaScript execution.

Compensating Controls: Implement input validation to ensure that uploaded agent definition files strictly adhere to expected schemas and do not contain dangerous YAML tags.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Insecure deserialization is a severe vulnerability. Administrators must prioritize the upgrade to the patched version of PraisonAI to prevent potential remote code execution attacks against their infrastructure.