Hackers Targeted PraisonAI Vulnerability Hours After Disclosure

Hackers Targeted PraisonAI Vulnerability Hours After Disclosure
Sysdig reports that exploitation attempts against a recent authentication bypass in PraisonAI began within four hours of public disclosure, with a scanner probing vulnerable internet-exposed instances. The flaw in CVE-2026-44338 affects PraisonAI versions 2.5.6 to 4.6.33 and was fixed in version 4.6.34, so organizations should patch immediately. #PraisonAI #CVE-2026-44338 #Sysdig

Keypoints

  • Sysdig detected probing less than four hours after the advisory was published.
  • CVE-2026-44338 affects PraisonAI versions 2.5.6 to 4.6.33.
  • The vulnerable legacy Flask API server had authentication disabled by default.
  • The scanner targeted /agents and appeared to be doing reconnaissance, not full exploitation.
  • PraisonAI version 4.6.34 resolves the vulnerability and should be deployed quickly.

Read More: https://www.securityweek.com/hackers-targeted-praisonai-vulnerability-hours-after-disclosure/