Description
CrewAI contains a arbitrary local file read vulnerability in the JSON loader tool that reads files without path validation, enabling access to files on the server.
Published: 2026-03-30
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Local File Read
Action: Apply Patch
AI Analysis

Impact

The CVE describes an arbitrary local file read flaw in the JSON loader component of CrewAI. The loader accepts JSON payloads and reads files without validating the file path, allowing an attacker to read any file that the CrewAI process can access. The impact is the potential disclosure of sensitive data such as configuration files, credentials, or other confidential information. The vulnerability could also be leveraged for further attacks if the attacker learns information that aids in privilege escalation or system compromise, but the primary impact is on confidentiality.

Affected Systems

All deployments of CrewAI are potentially affected because the description does not specify affected versions or exclusion criteria. This includes both self‑hosted installations and cloud‑based services where the JSON loader feature is enabled. Users should review their setup to determine if the vulnerable JSON loader is active and consider upgrading once a patch is available.

Risk and Exploitability

Exploitation requires the attacker to provide a JSON payload to the vulnerable loader, implying a local or privileged attacker with access to the CrewAI instance. The CVSS score is not reported and EPSS data is unavailable, so the exact severity cannot be quantified. The vulnerability is not listed in the CISA KEV catalog, indicating no known widespread exploitation. Nonetheless, because the flaw allows arbitrary file reading, an attacker could gain footholds that may lead to further compromise. No additional conditions for exploitation are provided in the available data.

Generated by OpenCVE AI on March 30, 2026 at 17:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest CrewAI update or patch that addresses the file path validation issue.
  • If a patch is not yet available, restrict or remove access to the JSON loader endpoint.
  • Ensure the module enforces strict file path validation, limiting reads to a designated directory.
  • Restrict filesystem permissions so the CrewAI process cannot read sensitive directories.
  • Monitor logs for anomalous file access or unexpected JSON inputs.

Generated by OpenCVE AI on March 30, 2026 at 17:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Crewai
Crewai crewai
Vendors & Products Crewai
Crewai crewai

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
CWE-22

Mon, 30 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Description CrewAI contains a arbitrary local file read vulnerability in the JSON loader tool that reads files without path validation, enabling access to files on the server.
Title CVE-2026-2285
References

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2026-03-30T15:51:39.962Z

Reserved: 2026-02-10T14:41:48.845Z

Link: CVE-2026-2285

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-30T16:16:04.670

Modified: 2026-03-30T16:16:04.670

Link: CVE-2026-2285

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:40:41Z

Weaknesses