PT-2026-30763 · Praisonai · Praisonai
Kritsana-Chaikaew
·
Published
2026-04-06
·
Updated
2026-04-08
·
CVE-2026-35615
CVSS v4.0
9.2
Critical
| Vector | AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N |
Name of the Vulnerable Software and Affected Versions
PraisonAI versions prior to 1.5.113
Description
PraisonAI is susceptible to a path traversal issue due to a flaw in the
validate path() function. This function first calls os.path.normpath(), which collapses '..' sequences, and then checks for the presence of '..' in the normalized path. Because the '..' sequences are collapsed before the check, the check is ineffective, allowing an attacker to traverse to any file on the system. The vulnerability also exists because the path validation function does not resolve symbolic links, which could potentially cause path traversal. The vulnerable file is src/praisonai-agents/praisonaiagents/tools/file tools.py lines 42-49. This allows access to any file on the system, potentially including sensitive files like /etc/passwd and /etc/shadow.Recommendations
Update PraisonAI to version 1.5.113 or later.
Exploit
Fix
Path traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Praisonai