Description
PraisonAI is a multi-agent teams system. Prior to 1.5.113, the Action Orchestrator feature contains a Path Traversal vulnerability that allows an attacker (or compromised agent) to write to arbitrary files outside of the configured workspace directory. By supplying relative path segments (../) in the target path, malicious actions can overwrite sensitive system files or drop executable payloads on the host. This vulnerability is fixed in 1.5.113.
Published: 2026-04-07
Score: 9 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary file write / path traversal
Action: Apply patch
AI Analysis

Impact

The Action Orchestrator feature in PraisonAI versions prior to 1.5.113 allows a path traversal flaw that enables an attacker or a compromised internal agent to write files outside of the configured workspace directory. By supplying relative path segments such as "../" in the target path, the orchestrator can overwrite critical system files or place executable payloads on the host, potentially compromising the entire system.

Affected Systems

Vendors: MervinPraison. Product: PraisonAI multi‑agent teams system. All releases before version 1.5.113 are affected. The issue is fixed in 1.5.113.

Risk and Exploitability

The CVSS score of 9 indicates critical severity. EPSS data is unavailable, but the vulnerability is nonetheless significant. The likely attack vector is an attacker (or a compromised agent) invoking the Action Orchestrator with a crafted path to trigger the arbitrary write. The flaw is not listed in CISA's KEV catalog; however, any user able to access the orchestrator, whether remotely or locally, could potentially exploit it to modify system files or install malware.

Generated by OpenCVE AI on April 7, 2026 at 22:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PraisonAI to version 1.5.113 or later.
  • If upgrading is not currently possible, restrict or disable Action Orchestrator access to trusted users only.
  • Monitor the system for unexpected file writes to system directories and review logs for anomalous activity.

Generated by OpenCVE AI on April 7, 2026 at 22:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-jfxc-v5g9-38xr PraisonAI Vulnerable to Arbitrary File Write / Path Traversal in Action Orchestrator
History

Thu, 16 Apr 2026 01:30:00 +0000

Type Values Removed Values Added
First Time appeared Praison
Praison praisonai
CPEs cpe:2.3:a:praison:praisonai:*:*:*:*:*:*:*:*
Vendors & Products Praison
Praison praisonai

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Mervinpraison
Mervinpraison praisonai
Vendors & Products Mervinpraison
Mervinpraison praisonai

Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description PraisonAI is a multi-agent teams system. Prior to 1.5.113, the Action Orchestrator feature contains a Path Traversal vulnerability that allows an attacker (or compromised agent) to write to arbitrary files outside of the configured workspace directory. By supplying relative path segments (../) in the target path, malicious actions can overwrite sensitive system files or drop executable payloads on the host. This vulnerability is fixed in 1.5.113.
Title Arbitrary File Write / Path Traversal in Action Orchestrator
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 9, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H'}


Subscriptions

Mervinpraison Praisonai
Praison Praisonai
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T17:27:47.512Z

Reserved: 2026-04-06T19:31:07.265Z

Link: CVE-2026-39305

cve-icon Vulnrichment

Updated: 2026-04-07T17:27:38.596Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T17:16:36.323

Modified: 2026-04-16T01:27:55.837

Link: CVE-2026-39305

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:47:43Z

Weaknesses