CVE-2026-39888
- EPSS 0.08%
- Veröffentlicht 08.04.2026 20:41:56
- Zuletzt bearbeitet 15.04.2026 18:02:58
PraisonAI is a multi-agent teams system. Prior to 1.5.115, execute_code() in praisonaiagents.tools.python_tools defaults to sandbox_mode="sandbox", which runs user code in a subprocess wrapped with a restricted __builtins__ dict and an AST-based bloc...
CVE-2026-39307
- EPSS 0.04%
- Veröffentlicht 07.04.2026 16:49:29
- Zuletzt bearbeitet 16.04.2026 01:18:47
PraisonAI is a multi-agent teams system. Prior to 1.5.113, The PraisonAI templates installation feature is vulnerable to a "Zip Slip" Arbitrary File Write attack. When downloading and extracting template archives from external sources (e.g., GitHub),...
CVE-2026-39308
- EPSS 0.06%
- Veröffentlicht 07.04.2026 16:48:42
- Zuletzt bearbeitet 16.04.2026 01:15:57
PraisonAI is a multi-agent teams system. Prior to 1.5.113, PraisonAI's recipe registry publish endpoint writes uploaded recipe bundles to a filesystem path derived from the bundle's internal manifest.json before it verifies that the manifest name and...
CVE-2026-39306
- EPSS 0.04%
- Veröffentlicht 07.04.2026 16:48:05
- Zuletzt bearbeitet 16.04.2026 01:23:37
PraisonAI is a multi-agent teams system. Prior to 1.5.113, PraisonAI's recipe registry pull flow extracts attacker-controlled .praison tar archives with tar.extractall() and does not validate archive member paths before extraction. A malicious publis...
- EPSS 0.02%
- Veröffentlicht 07.04.2026 16:47:18
- Zuletzt bearbeitet 16.04.2026 01:27:55
PraisonAI is a multi-agent teams system. Prior to 1.5.113, the Action Orchestrator feature contains a Path Traversal vulnerability that allows an attacker (or compromised agent) to write to arbitrary files outside of the configured workspace director...
CVE-2026-35615
- EPSS 0.06%
- Veröffentlicht 07.04.2026 16:46:15
- Zuletzt bearbeitet 16.04.2026 01:34:08
PraisonAI is a multi-agent teams system. Prior to 1.5.113, _validate_path() calls os.path.normpath() first, which collapses .. sequences, then checks for '..' in normalized. Since .. is already collapsed, the check always passes. This makes the check...
CVE-2026-34953
- EPSS 0.04%
- Veröffentlicht 03.04.2026 23:17:06
- Zuletzt bearbeitet 09.04.2026 16:52:58
PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token i...
CVE-2026-34952
- EPSS 0.04%
- Veröffentlicht 03.04.2026 23:17:06
- Zuletzt bearbeitet 09.04.2026 16:55:59
PraisonAI is a multi-agent teams system. Prior to version 4.5.97, the PraisonAI Gateway server accepts WebSocket connections at /ws and serves agent topology at /info with no authentication. Any network client can connect, enumerate registered agents...
CVE-2026-34939
- EPSS 0.05%
- Veröffentlicht 03.04.2026 23:17:06
- Zuletzt bearbeitet 09.04.2026 16:57:59
PraisonAI is a multi-agent teams system. Prior to version 4.5.90, MCPToolIndex.search_tools() compiles a caller-supplied string directly as a Python regular expression with no validation, sanitization, or timeout. A crafted regex causes catastrophic ...
CVE-2026-34936
- EPSS 0.03%
- Veröffentlicht 03.04.2026 23:17:05
- Zuletzt bearbeitet 14.04.2026 18:14:29
PraisonAI is a multi-agent teams system. Prior to version 4.5.90, passthrough() and apassthrough() in praisonai accept a caller-controlled api_base parameter that is concatenated with endpoint and passed directly to httpx.Client.request() when the li...