Sysdig reports that exploitation attempts against a recent authentication bypass in PraisonAI began within four hours of public disclosure, with a scanner probing vulnerable internet-exposed instances. The flaw in CVE-2026-44338 affects PraisonAI versions 2.5.6 to 4.6.33 and was fixed in version 4.6.34, so organizations should patch immediately. #PraisonAI #CVE-2026-44338 #Sysdig
Keypoints
- Sysdig detected probing less than four hours after the advisory was published.
- CVE-2026-44338 affects PraisonAI versions 2.5.6 to 4.6.33.
- The vulnerable legacy Flask API server had authentication disabled by default.
- The scanner targeted /agents and appeared to be doing reconnaissance, not full exploitation.
- PraisonAI version 4.6.34 resolves the vulnerability and should be deployed quickly.
Read More: https://www.securityweek.com/hackers-targeted-praisonai-vulnerability-hours-after-disclosure/