Description
PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, he list_files() tool in FileTools validates the directory parameter against workspace boundaries via _validate_path(), but passes the pattern parameter directly to Path.glob() without any validation. Since Python's Path.glob() supports .. path segments, an attacker can use relative path traversal in the glob pattern to enumerate arbitrary files outside the workspace, obtaining file metadata (existence, name, size, timestamps) for any path on the filesystem. This vulnerability is fixed in 1.5.128.
Published: 2026-04-09
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized File Enumeration
Action: Patch
AI Analysis

Impact

PraisonAIAgents is a multi‑agent system that offers a list_files tool to enumerate files within a workspace. Prior to version 1.5.128, the tool validated the directory argument against workspace boundaries via an internal check, but it passed the user‑supplied glob pattern directly to Python’s Path.glob() without validation. Because Path.glob() accepts parent path segments, an attacker can embed relative traversal components (..), allowing the enumeration of files outside the intended workspace. The exposed data – file names, sizes and timestamps – represents an information‑disclosure vulnerability (CWE‑22) rather than a code‑execution flaw. The vulnerability therefore enables an attacker to discover the existence and characteristics of arbitrary filesystem objects without modifying them.

Affected Systems

The flaw affects all deployments of PraisonAIAgents distributed by MervinPraison with a version older than 1.5.128. The issue was fixed in release 1.5.128, so any installation newer than that version is not impacted. No other vendors or product variants are reported.

Risk and Exploitability

The CVSS score of 5.3 indicates medium severity. No EPSS score is available, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires the ability to invoke the list_files function; if the API endpoint is reachable from the network, an attacker can supply a crafted glob pattern and trigger the flaw remotely. The impact is limited to file metadata disclosure, which can aid further attacks but does not allow direct code execution. Overall risk is moderate, warranting prompt remediation.

Generated by OpenCVE AI on April 10, 2026 at 00:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PraisonAIAgents to version 1.5.128 or later
  • Restrict access to list_files to authenticated and authorized users if the upgrade cannot be applied immediately
  • If upgrade is not feasible, disable glob pattern support or manually enforce workspace boundary checks in the configuration
  • Verify that the patch or configuration change is in place on all affected instances

Generated by OpenCVE AI on April 10, 2026 at 00:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-7j2f-xc8p-fjmq PraisonAIAgents: Path Traversal via Unvalidated Glob Pattern in list_files Bypasses Workspace Boundary
History

Mon, 20 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Praison
Praison praisonaiagents
CPEs cpe:2.3:a:praison:praisonaiagents:*:*:*:*:*:*:*:*
Vendors & Products Praison
Praison praisonaiagents

Mon, 13 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Mervinpraison
Mervinpraison praisonaiagents
Vendors & Products Mervinpraison
Mervinpraison praisonaiagents

Thu, 09 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Description PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, he list_files() tool in FileTools validates the directory parameter against workspace boundaries via _validate_path(), but passes the pattern parameter directly to Path.glob() without any validation. Since Python's Path.glob() supports .. path segments, an attacker can use relative path traversal in the glob pattern to enumerate arbitrary files outside the workspace, obtaining file metadata (existence, name, size, timestamps) for any path on the filesystem. This vulnerability is fixed in 1.5.128.
Title PraisonAIAgents has a Path Traversal via Unvalidated Glob Pattern in list_files Bypasses Workspace Boundary
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Mervinpraison Praisonaiagents
Praison Praisonaiagents
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-13T20:40:43.806Z

Reserved: 2026-04-09T19:31:56.013Z

Link: CVE-2026-40152

cve-icon Vulnrichment

Updated: 2026-04-13T20:40:39.376Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T22:16:36.193

Modified: 2026-04-20T18:33:29.100

Link: CVE-2026-40152

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:28:44Z

Weaknesses