{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreibcelroparyorreutrmcsvdmccoduo6j5mcf7gysadmato5g6lhly",
"uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mm7ft6zjpu22"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreiaojfoahosg4qbrwnyn5ey23gd4f7s66xn7vnpu6tm2ortrfn22s4"
},
"mimeType": "image/webp",
"size": 39468
},
"path": "/praisonai-cve-2026-44338-targeted-within-hours-of-public-disclosure/",
"publishedAt": "2026-05-18T19:12:01.000Z",
"site": "https://vpncentral.com",
"tags": [
"News",
"PraisonAI CVE-2026-44338 Targeted Within Hours of Public Disclosure",
"VPN Central"
],
"textContent": "A PraisonAI vulnerability tracked as CVE-2026-44338 was targeted within hours of public disclosure, showing how quickly attackers and scanners now move against exposed AI agent infrastructure. The flaw affects PraisonAI versions from 2.5.6 through 4.6.33 and has been fixed in version 4.6.34. It comes from a legacy Flask API server that shipped with authentication disabled […]\n\nThe post PraisonAI CVE-2026-44338 Targeted Within Hours of Public Disclosure appeared first on VPN Central.",
"title": "PraisonAI CVE-2026-44338 Targeted Within Hours of Public Disclosure"
}