| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-98f9-fqg5-hvq5 | PraisonAI Has Authentication Bypass via OAuthManager.validate_token() |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mervinpraison
Mervinpraison praisonai |
|
| Vendors & Products |
Mervinpraison
Mervinpraison praisonai |
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 04 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access to all registered tools and agent capabilities. This issue has been patched in version 4.5.97. | |
| Title | PraisonAI: Authentication Bypass in OAuthManager.validate_token() | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-06T16:04:54.615Z
Reserved: 2026-03-31T17:27:08.661Z
Link: CVE-2026-34953
Updated: 2026-04-06T16:04:44.692Z
Status : Undergoing Analysis
Published: 2026-04-03T23:17:06.653
Modified: 2026-04-07T13:20:55.200
Link: CVE-2026-34953
No data.
OpenCVE Enrichment
Updated: 2026-04-06T22:21:25Z
Github GHSA