CVE-2026-40088: PraisonAI Vulnerable to OS Command Injection
(updated )
The execute_command function and workflow shell execution are exposed to user-controlled input via agent workflows, YAML definitions, and LLM-generated tool calls, allowing attackers to inject arbitrary shell commands through shell metacharacters.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-40088 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →