CVE-2026-34938: PraisonAI: Python Sandbox Escape via str Subclass startswith() Override in execute_code
(updated )
execute_code() in praisonai-agents runs attacker-controlled Python inside a three-layer sandbox that can be fully bypassed by passing a str subclass with an overridden startswith() method to the _safe_getattr wrapper, achieving arbitrary OS command execution on the host.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-34938 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →