Hackers Exploit Newly Disclosed Prison AI System Vulnerability
Authentication Bypass Vulnerability in PraisonAI
PraisonAI, a multifaceted framework for deploying autonomous AI agents, has been affected by a severe authentication bypass vulnerability. The issue arose due to the inclusion of a legacy Flask API server in versions 2.5.6 to 4.6.33, which had authentication disabled by default.
Exploitation Attempts
A scanner identified as “CVE-Detector/1.0” began probing the vulnerable endpoint on internet-exposed instances within three hours and 44 minutes of the advisory’s release. The activity was attributed to a scanner rather than interactive exploitation, with the scanner performing two consecutive sweeps, sending approximately 140 requests over roughly one minute.
Vulnerability Details
The vulnerability allowed unauthorized callers to access sensitive endpoints, including agents metadata and triggering workflows without providing a token. As explained by a National Institute of Standards and Technology (NIST) advisory, when the legacy server is utilized, any caller reaching it can execute the agents.yaml workflow through the “/chat” endpoint without authentication.
Patch Release
The vulnerability was addressed in PraisonAI version 4.6.34, prompting organizations to update their deployments as soon as possible. Experts emphasize the critical importance of timely patching and mitigation in response to high-severity advisories affecting organizational stacks, especially considering the accelerated pace of exploitation following disclosure in the post-AI era.
