No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 08 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Praison
Praison praisonai |
|
| CPEs | cpe:2.3:a:praison:praisonai:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Praison
Praison praisonai |
Fri, 08 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PraisonAI is a multi-agent teams system. From version 2.4.1 to before version 4.6.34, PraisonAI exposes optional SQL/CQL-backed knowledge-store implementations that build table and index identifiers from unvalidated name and collection arguments. Applications that pass untrusted collection names into these backends can trigger SQL or CQL injection. This issue has been patched in version 4.6.34. | |
| Title | PraisonAI knowledge-store backends interpolate unvalidated collection names into SQL and CQL queries | |
| Weaknesses | CWE-20 CWE-89 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-08T14:19:46.766Z
Reserved: 2026-05-05T19:52:59.147Z
Link: CVE-2026-44337
Updated: 2026-05-08T14:19:38.407Z
Status : Analyzed
Published: 2026-05-08T14:16:46.587
Modified: 2026-05-08T19:07:00.780
Link: CVE-2026-44337
No data.
OpenCVE Enrichment
Updated: 2026-05-08T18:30:06Z