Praison

Praisonai

33 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 08.04.2026 20:41:56
  • Zuletzt bearbeitet 15.04.2026 18:02:58

PraisonAI is a multi-agent teams system. Prior to 1.5.115, execute_code() in praisonaiagents.tools.python_tools defaults to sandbox_mode="sandbox", which runs user code in a subprocess wrapped with a restricted __builtins__ dict and an AST-based bloc...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 07.04.2026 16:49:29
  • Zuletzt bearbeitet 16.04.2026 01:18:47

PraisonAI is a multi-agent teams system. Prior to 1.5.113, The PraisonAI templates installation feature is vulnerable to a "Zip Slip" Arbitrary File Write attack. When downloading and extracting template archives from external sources (e.g., GitHub),...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 07.04.2026 16:48:42
  • Zuletzt bearbeitet 16.04.2026 01:15:57

PraisonAI is a multi-agent teams system. Prior to 1.5.113, PraisonAI's recipe registry publish endpoint writes uploaded recipe bundles to a filesystem path derived from the bundle's internal manifest.json before it verifies that the manifest name and...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 07.04.2026 16:48:05
  • Zuletzt bearbeitet 16.04.2026 01:23:37

PraisonAI is a multi-agent teams system. Prior to 1.5.113, PraisonAI's recipe registry pull flow extracts attacker-controlled .praison tar archives with tar.extractall() and does not validate archive member paths before extraction. A malicious publis...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 07.04.2026 16:47:18
  • Zuletzt bearbeitet 16.04.2026 01:27:55

PraisonAI is a multi-agent teams system. Prior to 1.5.113, the Action Orchestrator feature contains a Path Traversal vulnerability that allows an attacker (or compromised agent) to write to arbitrary files outside of the configured workspace director...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 07.04.2026 16:46:15
  • Zuletzt bearbeitet 16.04.2026 01:34:08

PraisonAI is a multi-agent teams system. Prior to 1.5.113, _validate_path() calls os.path.normpath() first, which collapses .. sequences, then checks for '..' in normalized. Since .. is already collapsed, the check always passes. This makes the check...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 03.04.2026 23:17:06
  • Zuletzt bearbeitet 09.04.2026 16:52:58

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token i...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 03.04.2026 23:17:06
  • Zuletzt bearbeitet 09.04.2026 16:55:59

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, the PraisonAI Gateway server accepts WebSocket connections at /ws and serves agent topology at /info with no authentication. Any network client can connect, enumerate registered agents...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 03.04.2026 23:17:06
  • Zuletzt bearbeitet 09.04.2026 16:57:59

PraisonAI is a multi-agent teams system. Prior to version 4.5.90, MCPToolIndex.search_tools() compiles a caller-supplied string directly as a Python regular expression with no validation, sanitization, or timeout. A crafted regex causes catastrophic ...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 03.04.2026 23:17:05
  • Zuletzt bearbeitet 14.04.2026 18:14:29

PraisonAI is a multi-agent teams system. Prior to version 4.5.90, passthrough() and apassthrough() in praisonai accept a caller-controlled api_base parameter that is concatenated with endpoint and passed directly to httpx.Client.request() when the li...