By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure
Tech News

PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure

By Viral Trending Content 4 Min Read
Share
SHARE

Ravie LakshmananMay 14, 2026Vulnerability / API Security

Threat actors have been observed attempting to exploit a recently disclosed security vulnerability in PraisonAI, an open-source multi-agent orchestration framework, within four hours of public disclosure.

The vulnerability in question is CVE-2026-44338 (CVSS score: 7.3), a case of missing authentication that exposes sensitive endpoints to anyone, potentially allowing an attacker to invoke the API server’s protected functionality without a token. 

“PraisonAI ships a legacy Flask API server with authentication disabled by default,” according to an advisory released by the maintainers earlier this month. “When that server is used, any caller that can reach it can access /agents and trigger the configured agents.yaml workflow through /chat without providing a token.”

Specifically, the legacy Flask-based API server, src/praisonai/api_server.py, hard-codes AUTH_ENABLED = False and AUTH_TOKEN = None. According to PraisonAI, successful exploitation of the flaw can have varied impacts, including –

  • Unauthenticated enumeration of the configured agent file through /agents
  • Unauthenticated triggering of the locally configured “agents.yaml” workflow through /chat
  • Repeated consumption of the model/API quota, and
  • Exposure of the results of PraisonAI.run() to the unauthenticated caller

“The impact therefore, depends on what the operator’s agents.yaml is allowed to do, but the authentication bypass is unconditional in the shipped legacy server,” PraisonAI said.

The vulnerability affects all versions of the Python package from 2.5.6 through 4.6.33. It has been patched in version 4.6.34. Security researcher Shmulik Cohen has been credited with discovering and reporting the bug.

In a report published by Sysdig this week, the cloud security company said it observed attempts to exploit the flaw within hours of it becoming public knowledge.

“Within three hours and 44 minutes of the advisory becoming public, a scanner identifying itself as CVE-Detector/1.0 was probing the exact vulnerable endpoint on internet-exposed instances,” it said. “The advisory was published [on May 11, 2026,] at 13:56 UTC. The first targeted request landed at 17:40 UTC the same day.”

The activity, per Sysdig, originated from the IP address 146.190.133[.]49 and followed a packaged-scanner profile that carried out two passes spaced eight minutes apart, with each pass pushing approximately 70 requests in roughly 50 seconds.

While the first pass scanned generic disclosure paths (/.env, /admin, /users/sign_in, /eval, /calculate, /Gemfile.lock), the second pass specifically singled out AI-agent surfaces, including PraisonAI.

“The probe that matched CVE-2026-44338 directly was a single GET /agents with no Authorization header and User-Agent CVE-Detector/1.0,” Sysdig said. “That request returns 200 OK with body {“agent_file”:”agents.yaml”,”agents”:[…]}, confirming the bypass was successful.”

The scanner has not been found to send any POST request to the “/chat” endpoint during either pass, indicating the activity is consistent with an initial check to determine if the auth bypass works and confirm if the host is exploitable via CVE-2026-44338.

The rapid exploitation of the PraisonAI is the latest example of a broader trend where threat actors are increasingly adopting newly disclosed flaws into their arsenal before they can be patched. Users are advised to apply the latest fixes as soon as possible, audit existing deployments, review model provider billing for any suspicious activity, and rotate credentials referenced in “agents.yaml.”

“Adversary tooling has scaled to the entire AI and agent ecosystem — no matter the size, and not just the household names – and the operating assumption for any project that ships an unauthenticated default must be that the window between disclosure and active exploitation is measured in single-digit hours,” Sysdig said.

You Might Also Like

Sony Xperia 1 VIII AI Camera Assistant Samples Look Awful

InstaFarm Automated Indoor Microgreens Garden Review: Easy Being Green

Microsoft May 2026 Patch Tuesday fixes 120 flaws, no zero-days

Dublin’s Lios gets renewed €2m ESA contract for its acoustic tech

Rumoured Amazon Smartphone Would be The Worst

TAGGED: ai agent, API Security, Authentication Bypass, Cyber Security, Cybersecurity, Internet, PraisonAI, Sysdig, Threat Intelligence, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article US 30-year bond yield tops 5% as Kevin Warsh takes Fed helm and inflation rises
Next Article Sony Xperia 1 VIII AI Camera Assistant Samples Look Awful
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Burned out and going nowhere: the American worker is too mentally drained to even look for a new job
Business
Pope decries rise of AI-directed warfare, saying it leads to a spiral of annihilation
World News
Hedera price forecast: HBAR risks 20% dive amid fresh selling
Crypto
Bitcoin Firm Nakamoto Surges In Revenue But Bleeds Cash In Q1
Crypto
Warning of record global temperatures as chance of very strong El Niño grows
World News
Celebrities at the Cannes Film Festival 2026: Photos of the Stars
Celebrity
Senua’s Saga: Hellblade 2 Developer Reported Around £5 Million in Profit As of June 30th, 2025
Gaming News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Investing £5 a day could help me build a second income of £329 a month!

Brussels unveils plans for a European Degree but struggles to explain why

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
Trump evokes more anger and fear from Democrats than Biden does from Republicans, AP-NORC poll shows
March 28, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?