LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-39890

CVE-2026-39890 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: April 9, 2026

PraisonAI - Remote Code Execution

Published: April 8, 2026Updated: April 9, 2026Remote Exploitable

Overview

PraisonAI < 4.5.115 contains a remote code execution caused by unsafe YAML parsing with dangerous tags in AgentService.loadAgentFromFile, letting attackers execute arbitrary JavaScript via malicious YAML upload.

Severity & Score

Severity: Critical
CVSS Score: 9.8
EPSS Score: 28.5%(Probability of exploitation in next 30 days)

Impact

Attackers can execute arbitrary JavaScript code remotely, leading to full server compromise.

Mitigation

Update to version 4.5.115 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Apr 9, 2026

šŸ”“ CVE-2026-39890 - Critical (9.8) PraisonAI is a multi-agent teams system. Prior to 4.5.115, the AgentService.loadAgentFromFile method uses the js-yaml library to parse YAML files without disabling dangerous tags (such as !!js/function and !!js/undefined). This allows an attacker ... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-39890/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-39890
Severity
Critical
CVSS Score
9.8
Type
insecure_deserialization
Status
unconfirmed
EPSS
28.5%
Social Posts
1

CWE

  • CWE-502

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

28.5%Probability of exploitation in the next 30 days