CVE-2026-34954: PraisonAI Has SSRF in FileTools.download_file() via Unvalidated URL
(updated )
FileTools.download_file() in praisonaiagents validates the destination path but performs no validation on the url parameter, passing it directly to httpx.stream() with follow_redirects=True. An attacker who controls the URL can reach any host accessible from the server including cloud metadata services and internal network services.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-34954 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →