Path Traversal Vulnerability in PraisonAI by Mervin Praison
CVE-2026-39306
7.3HIGH
What is CVE-2026-39306?
PraisonAI, a multi-agent teams system, has a significant vulnerability due to inadequate validation of archive member paths during the recipe registry pull process. Before version 1.5.113, the system's tar extraction method allows attackers to upload malicious .praison tar archives that can contain directory traversal sequences. This enables a malicious publisher to craft recipe bundles leading users to inadvertently write files outside their chosen output directories, exposing their systems to arbitrary file writes. The flaw persists across both local and HTTP registry paths and is not mitigated by checksum verification, as the malicious payload is encapsulated within the signed bundle itself.
Affected Version(s)
PraisonAI < 4.5.113
