Praison

Praisonaiagents

11 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.06%
  • Veröffentlicht 14.04.2026 03:05:05
  • Zuletzt bearbeitet 20.04.2026 17:46:45

PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the browser bridge (praisonai browser start) is vulnerable to unauthenticated remote session hijacking due to missing authentication and a...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 14.04.2026 03:00:21
  • Zuletzt bearbeitet 20.04.2026 17:47:03

PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the workflow engine is vulnerable to arbitrary command and code execution through untrusted YAML files. When praisonai workflow run <file....

Exploit
  • EPSS 0.02%
  • Veröffentlicht 14.04.2026 02:55:38
  • Zuletzt bearbeitet 20.04.2026 17:47:31

PraisonAI is a multi-agent teams system. Versions 4.5.138 and below are vulnerable to arbitrary code execution through automatic, unsanitized import of a tools.py file from the current working directory. Components including call.py (import_tools_fro...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 10.04.2026 16:59:09
  • Zuletzt bearbeitet 20.04.2026 20:17:49

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, web_crawl's httpx fallback path passes user-supplied URLs directly to httpx.AsyncClient.get() with follow_redirects=True and no host validation. An LLM agent tricked into crawling an in...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 09.04.2026 22:16:36
  • Zuletzt bearbeitet 20.04.2026 18:33:29

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, he list_files() tool in FileTools validates the directory parameter against workspace boundaries via _validate_path(), but passes the pattern parameter directly to Path.glob() without a...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 09.04.2026 22:16:36
  • Zuletzt bearbeitet 20.04.2026 19:55:29

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, the execute_command function in shell_tools.py calls os.path.expandvars() on every command argument at line 64, manually re-implementing shell-level environment variable expansion despi...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 09.04.2026 22:16:35
  • Zuletzt bearbeitet 17.04.2026 18:23:42

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, read_skill_file() in skill_tools.py allows reading arbitrary files from the filesystem by accepting an unrestricted skill_path parameter. Unlike file_tools.read_file which enforces work...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 09.04.2026 22:16:34
  • Zuletzt bearbeitet 17.04.2026 19:40:24

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, he memory hooks executor in praisonaiagents passes a user-controlled command string directly to subprocess.run() with shell=True at src/praisonai-agents/praisonaiagents/memory/hooks.py....

Exploit
  • EPSS 0.03%
  • Veröffentlicht 03.04.2026 23:17:06
  • Zuletzt bearbeitet 14.04.2026 18:09:51

PraisonAI is a multi-agent teams system. Prior to version 1.5.90, run_python() in praisonai constructs a shell command string by interpolating user-controlled code into python3 -c "<code>" and passing it to subprocess.run(..., shell=True). The escapi...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 03.04.2026 23:17:06
  • Zuletzt bearbeitet 14.04.2026 18:07:19

PraisonAI is a multi-agent teams system. Prior to version 1.5.90, execute_code() in praisonai-agents runs attacker-controlled Python inside a three-layer sandbox that can be fully bypassed by passing a str subclass with an overridden startswith() met...