CVE 2026 44338 exposes PraisonAI with disable authentication and untouched access to agents

Published 4 min de lectura 40 reading

In recent weeks it was confirmed that malicious actors began to exploit, within hours, an authentication failure in PraisonAI, an open source framework for multiple agent orchestration; the vulnerability recorded as CVE-2026-44338 allows to consult sensitive end points without token, provided that the Flask inherited server is in use.

The technical root of the problem is simple and worrying: the legacy API server, in src / praisonai / api _ server.py, comes with AUTH _ ENABLED = False and AUTH _ TOKEN = None by default, which enables access to / agents and the possibility to trigger the configured flow on agents.yaml via / chat without authentication. According to the maintainers, this affects the versions of the Python bookstore from 2.5.6 to 4.6.33 and was corrected at 4.6.34; the discovery was reported by the researcher Shmulik Cohen.

CVE 2026 44338 exposes PraisonAI with disable authentication and untouched access to agents
Image generated with IA.

The speed of the exploitation attempts is the most clear lesson: a scanner identified as CVE-Detector / 1.0 began to consult instances exposed to the Internet just hours after public disclosure; Sysdig documented the first request addressed to the vulnerable endpoint at 17: 40 UTC on the same day of the publication, and observed two survey passes, the second already focused on surfaces of IA agents like PraisonAI. In the records the GET / agents without header Authorization returned 200 OK with the listed agents file, which confirms the bypass.

The practical implications depend on the content of each agents.yaml: from the simple enumeration of the configuration to the remote triggering of flows that can consume model quotas or APIs, reveal performance results and, in poorly configured environments, allow side movements or exfiltration. The vector does not require creative exploitation: it is enough that the legacy process is accessible from the network.

For any organization that uses PraisonAI or deployments based on similar agents, the immediate priorities are clear: to update to the corrected version (4.6.34 in this case) or to prevent the use of the legacy Flask server; to audit and minimize the exposure of development or administration endpoints; and to review the agents.yaml files for credentials, hooks or access to external services to be rotated. In addition, billing and consumer records in model providers should be reviewed in case of unauthorized use.

From the operational point of view, it is important not to limit it to the patch: apply network controls that restrict who can reach the endpoints (firewall, cloud security rules, access only by VPN or localhost), implement monitoring that seeks survey patterns (e.g., GET a / agents without Authorization or user-Agent suspected) and establish alerts on consumption peaks in model APIs. It is also prudent to enable robust authentication and to remove by default any server that starts without protection.

If your deployment has already been scanned, consider revoking and rotating all the credentials referred to in agents.yaml, audit access and backups for possible exfilterations, and look for signs of calls to / chat that you may have run workflows. Engagement detection tools, log analysis and configuration reviews can reduce the risk of severe impacts.

CVE 2026 44338 exposes PraisonAI with disable authentication and untouched access to agents
Image generated with IA.

This episode fits into a broader trend: the ecosystem of tools and adverse scanners quickly incorporates public vulnerabilities, with operating windows that are often measured in hours. It is therefore essential that development and security teams treat unsecure default configurations as potential incidents and adopt minimum privilege principles since design. For guidance on good authentication practices and how to close these vectors, see resources such as NVD from NIST and OWASP's authentication recommendations.

Vulnerability in PraisonAI recalls that the speed of parking and operational hygiene matter as much as the technical patch. For more information on managing critical vulnerabilities and known operating catalogues, visit the CISA page on freely exploited vulnerabilities and the NVD database. Implementing updates, network segmentation and secret rotation should be part of the immediate response of any team that manages IA agents.

NVD (NIST) and OWASP Authentication Cheat Sheet provide good references to strengthen access controls, and list of CISA helps to prioritize patches against active risks.

Coverage

Related

More news on the same subject.