CVE-2026-40152

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, he list_files() tool in FileTools validates the directory parameter against workspace boundaries via _validate_path(), but passes the pattern parameter directly to Path.glob() without any validation. Since Python's Path.glob() supports .. path segments, an attacker can use relative path traversal in the glob pattern to enumerate arbitrary files outside the workspace, obtaining file metadata (existence, name, size, timestamps) for any path on the filesystem. This vulnerability is fixed in 1.5.128.
Configurations

Configuration 1 (hide)

cpe:2.3:a:praison:praisonaiagents:*:*:*:*:*:*:*:*

History

20 Apr 2026, 18:33

Type Values Removed Values Added
References () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-7j2f-xc8p-fjmq - () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-7j2f-xc8p-fjmq - Exploit, Vendor Advisory
First Time Praison praisonaiagents
Praison
CPE cpe:2.3:a:praison:praisonaiagents:*:*:*:*:*:*:*:*

09 Apr 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-09 22:16

Updated : 2026-04-20 18:33


NVD link : CVE-2026-40152

Mitre link : CVE-2026-40152

CVE.ORG link : CVE-2026-40152


JSON object : View

Products Affected

praison

  • praisonaiagents
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')