Description
PraisonAI is a multi-agent teams system. Prior to 4.5.128, cmd_unpack in the recipe CLI extracts .praison tar archives using raw tar.extract() without validating archive member paths. A .praison bundle containing ../../ entries will write files outside the intended output directory. An attacker who distributes a malicious bundle can overwrite arbitrary files on the victim's filesystem when they run praisonai recipe unpack. This vulnerability is fixed in 4.5.128.
Published: 2026-04-10
Score: 9.4 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary file write (possible system compromise)
Action: Apply patch
AI Analysis

Impact

The vulnerability arises in the recipe CLI command that extracts .praison tar archives. Before version 4.5.128, the extraction logic calls tar.extract() without sanitizing the archive member paths. If an archive contains entries with "../../" components, the extraction process will write files outside the intended output directory. This allows an attacker who can supply a malicious bundle to overwrite arbitrary files on the victim’s filesystem. The weakness is a classic path traversal (CWE‑22). The primary impact is the ability to replace critical configuration files or binaries, which can lead to privilege escalation or denial of service.

Affected Systems

The affected product is MervinPraison PryasonAI. All releases prior to 4.5.128 are vulnerable. No specific sub‑components are listed, but any instance that invokes the recipe unpack command is at risk.

Risk and Exploitability

The CVSS base score is 9.4, indicating a high severity flaw. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. It is inferred that the attack vector requires the victim to run the "praisonai recipe unpack" command against a crafted .praison bundle. An attacker can deliver a malicious bundle and await its execution by a user or automated process. Once executed, the attack can overwrite any file the running user has write access to, creating a pathway for further compromise. The lack of a publicly demonstrated exploit and the absence of EPSS data suggest moderate exploitation likelihood, but the high CVSS score and wide potential impact keep overall risk elevated.

Generated by OpenCVE AI on April 10, 2026 at 18:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PryasonAI to version 4.5.128 or later
  • If upgrading is not immediately possible, restrict the execution of "praisonai recipe unpack" to trusted, signed bundles only
  • Audit file permissions in destinations used by the recipe unpack command to limit write access
  • Apply additional security controls such as file integrity monitoring for critical system files

Generated by OpenCVE AI on April 10, 2026 at 18:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-99g3-w8gr-x37c PraisonAI vulnerable to arbitrary file write via path traversal in `praisonai recipe unpack`
History

Fri, 24 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Praison
Praison praisonai
CPEs cpe:2.3:a:praison:praisonai:*:*:*:*:*:*:*:*
Vendors & Products Praison
Praison praisonai
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Tue, 14 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Mervinpraison
Mervinpraison praisonai
Vendors & Products Mervinpraison
Mervinpraison praisonai

Fri, 10 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Description PraisonAI is a multi-agent teams system. Prior to 4.5.128, cmd_unpack in the recipe CLI extracts .praison tar archives using raw tar.extract() without validating archive member paths. A .praison bundle containing ../../ entries will write files outside the intended output directory. An attacker who distributes a malicious bundle can overwrite arbitrary files on the victim's filesystem when they run praisonai recipe unpack. This vulnerability is fixed in 4.5.128.
Title PraisonAI affected by arbitrary file write via path traversal in `praisonai recipe unpack`
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Subscriptions

Mervinpraison Praisonai
Praison Praisonai
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-14T14:13:29.632Z

Reserved: 2026-04-09T19:31:56.014Z

Link: CVE-2026-40157

cve-icon Vulnrichment

Updated: 2026-04-14T14:13:18.397Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-10T17:17:13.457

Modified: 2026-04-24T15:07:36.003

Link: CVE-2026-40157

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T13:00:17Z

Weaknesses