The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-39891

CVE-2026-39891: PraisonAI Template Injection RCE Vulnerability

CVE-2026-39891 is a remote code execution vulnerability in PraisonAI's multi-agent system caused by unsafe template rendering in agent tools. This article covers the technical details, affected versions, impact, and mitigation.

Published: April 10, 2026

CVE-2026-39891 Overview

CVE-2026-39891 is a Code Injection vulnerability affecting PraisonAI, a multi-agent teams system. Prior to version 4.5.115, the create_agent_centric_tools() function returns tools (like acp_create_file) that process file content using template rendering. When user input from agent.start() is passed directly into these tools without proper escaping, template expressions embedded in the input are executed rather than treated as literal text. This creates a template injection vulnerability that can be exploited by authenticated attackers with network access.

Critical Impact

Attackers with low privileges can inject malicious template expressions that get executed on the server, potentially leading to unauthorized code execution, data exfiltration, or complete system compromise.

Affected Products

  • PraisonAI versions prior to 4.5.115

Discovery Timeline

  • 2026-04-08 - CVE CVE-2026-39891 published to NVD
  • 2026-04-09 - Last updated in NVD database

Technical Details for CVE-2026-39891

Vulnerability Analysis

This vulnerability is classified as CWE-94 (Improper Control of Generation of Code), commonly known as Code Injection. The root issue lies in how PraisonAI's agent-centric tools handle template rendering when processing user-supplied input. The vulnerability requires an authenticated user with network access, but once those conditions are met, exploitation requires low complexity and no user interaction.

The impact is severe across the CIA triad—attackers can potentially achieve high confidentiality impact through data exfiltration, high integrity impact through unauthorized modifications, and high availability impact through system disruption. The unchanged scope indicates the vulnerability is contained within the affected component's security authority.

Root Cause

The create_agent_centric_tools() function generates tools that utilize template rendering engines to process file content. The fundamental flaw is the absence of input sanitization or escaping mechanisms before user-controlled data is passed into the template rendering context. When agent.start() receives user input containing template syntax (such as {{ }} expressions or similar template directives), this input flows directly into tools like acp_create_file where the template engine interprets and executes these expressions instead of treating them as literal strings.

Attack Vector

The attack vector is network-based, requiring the attacker to have low-level privileges (authenticated access) to the PraisonAI system. An attacker can craft malicious input containing template injection payloads and submit them through the agent.start() entry point. When the agent-centric tools process this input through the template rendering engine, the injected template expressions are evaluated, allowing arbitrary code execution within the template engine's context.

The exploitation mechanism involves embedding malicious template expressions within data that gets processed by the vulnerable tools. Depending on the template engine used, attackers could potentially access internal objects, execute system commands, read sensitive files, or perform other malicious operations permitted by the template engine's capabilities.

For detailed technical information and proof-of-concept details, refer to the GitHub Security Advisory.

Detection Methods for CVE-2026-39891

Indicators of Compromise

  • Unusual template syntax patterns (e.g., {{ }}, {% %}, ${ }) appearing in user input logs or agent interaction records
  • Unexpected file creation or modification by acp_create_file or similar agent tools
  • Error logs indicating template rendering failures with suspicious payloads
  • Anomalous process spawning or network connections originating from the PraisonAI application

Detection Strategies

  • Implement input validation monitoring to detect template injection patterns in user-submitted data
  • Deploy application-level logging to capture all inputs processed by agent.start() and agent-centric tools
  • Configure intrusion detection systems to alert on common template injection signatures
  • Enable runtime application self-protection (RASP) to detect and block template injection attempts

Monitoring Recommendations

  • Monitor PraisonAI application logs for template rendering errors or exceptions
  • Establish baseline behavior for agent-centric tool operations and alert on deviations
  • Track file system changes initiated by PraisonAI processes for unexpected modifications
  • Implement real-time alerting for suspicious input patterns reaching the template engine

How to Mitigate CVE-2026-39891

Immediate Actions Required

  • Upgrade PraisonAI to version 4.5.115 or later immediately
  • Audit recent agent interactions for signs of exploitation attempts
  • Review application logs for suspicious template syntax in user inputs
  • Restrict network access to PraisonAI instances to trusted users and networks

Patch Information

The vulnerability has been fixed in PraisonAI version 4.5.115. The patch addresses the template injection issue by implementing proper input escaping before user data is processed by the template rendering engine. Organizations should update to the patched version as soon as possible. Refer to the GitHub Security Advisory for additional patch details.

Workarounds

  • If immediate patching is not possible, restrict access to PraisonAI to only trusted, authenticated users
  • Implement a web application firewall (WAF) with rules to detect and block template injection payloads
  • Disable or restrict access to agent-centric tools like acp_create_file until the patch can be applied
  • Monitor and sanitize all user inputs at the application boundary before they reach agent processing functions

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechPraisonai

  • SeverityHIGH

  • CVSS Score8.8

  • EPSS Probability0.05%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-94
  • Technical References
  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-40287: PraisonAI RCE Vulnerability

  • CVE-2026-40288: PraisonAI YAML Workflow RCE Vulnerability

  • CVE-2026-40156: PraisonAI RCE Vulnerability

  • CVE-2026-40158: PraisonAI Sandbox Bypass RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English