Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. praisonai
  4. ›
  5. CVE-2026-34953

CVE-2026-34953: PraisonAI Has Authentication Bypass via OAuthManager.validate_token()

April 1, 2026 (updated April 6, 2026)

OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access to all registered tools and agent capabilities.

References

  • github.com/MervinPraison/PraisonAI
  • github.com/MervinPraison/PraisonAI/security/advisories/GHSA-98f9-fqg5-hvq5
  • github.com/advisories/GHSA-98f9-fqg5-hvq5
  • nvd.nist.gov/vuln/detail/CVE-2026-34953

Code Behaviors & Features

Detect and mitigate CVE-2026-34953 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 4.5.97

Fixed versions

  • 4.5.97

Solution

Upgrade to version 4.5.97 or above.

Impact 9.1 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-863: Incorrect Authorization

Source file

pypi/praisonai/CVE-2026-34953.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 07 Apr 2026 12:19:42 +0000.