Path Traversal Vulnerability in PraisonAI Multi-Agent System
CVE-2026-40157

9.4CRITICAL

Key Information:

Status
Vendor
CVE Published:
10 April 2026

What is CVE-2026-40157?

PraisonAI, a multi-agent team system, is vulnerable to a path traversal issue in its command-line interface (CLI) for recipe management. This vulnerability arises from the cmd_unpack function, which processes .praison tar archives by using raw tar.extract() without adequate validation of archive member paths. As a result, a malicious actor can create a .praison bundle that contains directory traversal sequences (e.g., ../../) which, when unpacked, may lead to the extraction of files outside the designated output directory. This flaw presents a risk where arbitrary files on the target filesystem could be overwritten upon executing the 'praisonai recipe unpack' command. This issue has been addressed in version 4.5.128.

Affected Version(s)

PraisonAI < 4.5.128

References

CVSS V4

Score:
9.4
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.