Skip to content

Hackers Targeted PraisonAI Vulnerability Hours After Disclosure

The first exploitation attempts were observed less than four hours after the authentication bypass was publicly disclosed. The post Hackers Targeted PraisonAI Vulnerability Hours After Disclosure appeared first on SecurityWeek.

Exploitation attempts targeting a recent authentication bypass vulnerability in PraisonAI started less than four hours after public disclosure, application protection firm Sysdig warns.

PraisonAI is a multi-agent framework that allows organizations to deploy autonomous AI agents for the execution of complex tasks.

Tracked as CVE-2026-44338, the newly disclosed security defect exists because PraisonAI versions 2.5.6 to 4.6.33 shipped with a legacy Flask API server that had authentication disabled by default.

Source: https://www.securityweek.com/hackers-targeted-praisonai-vulnerability-hours-after-disclosure/

Related breach coverage