Hackers Targeted PraisonAI Vulnerability Hours After Disclosure
Hackers probed PraisonAI authentication bypass CVE-2026-44338 within 3.75 hours of disclosure.
Summary
PraisonAI versions 2.5.6 to 4.6.33 contained an authentication bypass (CVE-2026-44338) due to disabled Flask API authentication by default, allowing unauthenticated access to agent workflows. Within 3 hours 44 minutes of public disclosure, a scanner identified as CVE-Detector/1.0 began probing internet-exposed instances for the vulnerable endpoint. Sysdig assessed the activity as reconnaissance-focused reconnaissance rather than active exploitation, but highlights the accelerated threat timeline enabled by AI-assisted tooling in the modern attack landscape.
Full text
Exploitation attempts targeting a recent authentication bypass vulnerability in PraisonAI started less than four hours after public disclosure, application protection firm Sysdig warns. PraisonAI is a multi-agent framework that allows organizations to deploy autonomous AI agents for the execution of complex tasks. Tracked as CVE-2026-44338, the newly disclosed security defect exists because PraisonAI versions 2.5.6 to 4.6.33 shipped with a legacy Flask API server that had authentication disabled by default. “When that server is used, any caller that can reach it can access /agents and trigger the configured agents.yaml workflow through /chat without providing a token,” a NIST advisory reads. With authentication disabled, /agents returns the configured agent metadata, while /chat accepts any JSON body with a message key and executes the agents.yaml workflow, ignoring the message value. “Within three hours and 44 minutes of the advisory becoming public, a scanner identifying itself as CVE-Detector/1.0 was probing the exact vulnerable endpoint on internet-exposed instances,” Sysdig says.Advertisement. Scroll to continue reading. The cybersecurity firm assesses that the observed activity was associated with a scanner, not interactive exploitation. “Two passes ran eight minutes apart, each pushing approximately 70 requests in roughly 50 seconds. The first pass swept generic disclosure paths (/.env, /admin, /users/sign_in, /eval, /calculate, /Gemfile.lock). The second pass narrowed to AI-agent surfaces,” the company says. The activity only targeted /agents, but did not send requests to /chat, suggesting that the attempt was focused on reconnaissance and validation. “Enumerate the agent list, confirm the auth bypass works, log the host as exploitable, and move on. Follow-on tooling is typically separate,” Sysdig notes. Achieving remote code execution (RCE) using this vulnerability, Sysdig explains, is not straightforward, as the unauthenticated attacker can only trigger what agents.yaml is configured for. In production environments, the workflow typically makes calls to various LLM providers (such as Anthropic, Bedrock, OpenAI, and others), grants access to various tools (including code interpreters, shells, and file I/O), or returns the agent file name and agent list. “The bypass itself is not arbitrary code execution. But because it removes authentication from a workflow trigger that an operator deliberately exposed to do something useful, the impact ceiling is whatever that workflow is allowed to do,” Sysdig notes. The vulnerability was resolved in PraisonAI version 4.6.34. Organizations should update their deployments as soon as possible. “AI-assisted tooling is enabling attackers to move from an advisory publication to a working exploit in timeframes that simply did not exist before. Consequently, the timeframe that organizations have to patch and mitigate, or even detect active probing, has shrunk. Rapid exploitation following disclosure is no longer an edge case reserved for zero-days. It is becoming a baseline,” Black Duck AI research engineer Vineeta Sangaraju said. “The assumptions of traditional risk models about attacker sophistication and time to exploit no longer hold. Organizations need to build the capability to detect and respond within hours, not days, of a high-severity advisory affecting their stack. In the post-AI era, the mere definition of AppSec terms like vulnerability likelihood, script kiddies, etc., needs to be redefined,” Sangaraju added. Related: New ‘Dirty Frag’ Linux Vulnerability Possibly Exploited in Attacks Related: Ivanti Patches EPMM Zero-Day Exploited in Targeted Attacks Related: Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State Hacking Related: Critical cPanel & WHM Vulnerability Exploited as Zero-Day for Months Written By Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. More from Ionut Arghire Fortinet, Ivanti Patch Critical VulnerabilitiesChipmaker Patch Tuesday: Intel and AMD Patch 70 VulnerabilitiesMicrosoft Patches 137 VulnerabilitiesAdobe Patches 52 Vulnerabilities in 10 ProductsWhite Circle Raises $11 Million for AI Control PlatformWest Pharmaceutical Services Hit by Disruptive Ransomware AttackSAP Patches Critical S/4HANA, Commerce VulnerabilitiesTanStack, Mistral AI, UiPath Hit in Fresh Supply Chain Attack Latest News High-Severity Vulnerability Patched in VMware FusionResearcher Drops YellowKey, GreenPlasma Windows Zero-DaysFoxconn Confirms North American Factories Hit by CyberattackMicrosoft, Palo Alto Networks Find Many Vulnerabilities by Using AI on Their Own CodeSweet Security Launches Agentic AI Red Teaming to Counter ‘Mythos Moment’Webinar Today: ROI for Cyber-Physical Security ProgramsGovernment to Scrutinize Instructure Over Canvas Disruption, Data Breach716,000 Impacted by OpenLoop Health Data Breach Trending Daily Briefing NewsletterSubscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: ROSI for CPS Security Programs May 13, 2026 In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveMalwarebytes has named Chung Ip as Chief Financial Officer.Semperis has appointed John Podboy as Chief Information Security Officer.Randy Menon has become Chief Product and Marketing Officer at One Identity.More People On The MoveExpert Insights Is the SOC Obsolete, and We Just Haven’t Admitted It Yet? Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au) The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) Flipboard Reddit Whatsapp Whatsapp Email
Indicators of Compromise
- cve — CVE-2026-44338
- malware — CVE-Detector/1.0