PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access to all registered tools and agent capabilities. This issue has been patched in version 4.5.97.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-98f9-fqg5-hvq5 | PraisonAI Has Authentication Bypass via OAuthManager.validate_token() |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 04 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access to all registered tools and agent capabilities. This issue has been patched in version 4.5.97. | |
| Title | PraisonAI: Authentication Bypass in OAuthManager.validate_token() | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-03T22:54:03.542Z
Reserved: 2026-03-31T17:27:08.661Z
Link: CVE-2026-34953
No data.
Status : Received
Published: 2026-04-03T23:17:06.653
Modified: 2026-04-03T23:17:06.653
Link: CVE-2026-34953
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA