PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, he list_files() tool in FileTools validates the directory parameter against workspace boundaries via _validate_path(), but passes the pattern parameter directly to Path.glob() without any validation. Since Python's Path.glob() supports .. path segments, an attacker can use relative path traversal in the glob pattern to enumerate arbitrary files outside the workspace, obtaining file metadata (existence, name, size, timestamps) for any path on the filesystem. This vulnerability is fixed in 1.5.128.
References
| Link | Resource |
|---|---|
| https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-7j2f-xc8p-fjmq | Exploit Vendor Advisory |
Configurations
History
20 Apr 2026, 18:33
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-7j2f-xc8p-fjmq - Exploit, Vendor Advisory | |
| First Time |
Praison praisonaiagents
Praison |
|
| CPE | cpe:2.3:a:praison:praisonaiagents:*:*:*:*:*:*:*:* |
09 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-09 22:16
Updated : 2026-04-20 18:33
NVD link : CVE-2026-40152
Mitre link : CVE-2026-40152
CVE.ORG link : CVE-2026-40152
JSON object : View
Products Affected
praison
- praisonaiagents
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
