Arbitrary File Write Vulnerability in PraisonAI by Mervin Praison
CVE-2026-39308

7.1HIGH

Key Information:

Status
Vendor
CVE Published:
7 April 2026

What is CVE-2026-39308?

PraisonAI, a multi-agent teams system, has a vulnerability in its recipe registry publish endpoint prior to version 1.5.113. This issue allows malicious users to exploit path traversal sequences in the bundle manifest, potentially enabling them to write files outside the designated registry root. If the registry operates without token protection, any network client can exploit this flaw. Even when a token is in place, users with publish access can still trigger the vulnerability. Although the requests would return an HTTP 400 error, the underlying risk of exposing the registry remains significant. The vulnerability is resolved in version 1.5.113.

Affected Version(s)

PraisonAI < 4.5.113

References

CVSS V3.1

Score:
7.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.