PraisonAI is a multi-agent teams system. Prior to version 4.5.90, the get_all_user_threads function constructs raw SQL queries using f-strings with unescaped thread IDs fetched from the database. An attacker stores a malicious thread ID via update_thread. When the application loads the thread list, the injected payload executes and grants full database access. This issue has been patched in version 4.5.90.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-9cq8-3v94-434g PraisonAI Has Second-Order SQL Injection in `get_all_user_threads`
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 03 Apr 2026 22:45:00 +0000

Type Values Removed Values Added
Description PraisonAI is a multi-agent teams system. Prior to version 4.5.90, the get_all_user_threads function constructs raw SQL queries using f-strings with unescaped thread IDs fetched from the database. An attacker stores a malicious thread ID via update_thread. When the application loads the thread list, the injected payload executes and grants full database access. This issue has been patched in version 4.5.90.
Title PraisonAI: Second-Order SQL Injection in `get_all_user_threads`
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-03T22:49:12.947Z

Reserved: 2026-03-31T17:27:08.660Z

Link: CVE-2026-34934

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-03T23:17:05.533

Modified: 2026-04-03T23:17:05.533

Link: CVE-2026-34934

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses