Логотип exploitDog
bind:CVE-2026-40157
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-40157

Количество 2

Количество 2

nvd логотип

CVE-2026-40157

5 дней назад

PraisonAI is a multi-agent teams system. Prior to 4.5.128, cmd_unpack in the recipe CLI extracts .praison tar archives using raw tar.extract() without validating archive member paths. A .praison bundle containing ../../ entries will write files outside the intended output directory. An attacker who distributes a malicious bundle can overwrite arbitrary files on the victim's filesystem when they run praisonai recipe unpack. This vulnerability is fixed in 4.5.128.

EPSS: Низкий
github логотип

GHSA-99g3-w8gr-x37c

5 дней назад

PraisonAI vulnerable to arbitrary file write via path traversal in `praisonai recipe unpack`

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-40157

PraisonAI is a multi-agent teams system. Prior to 4.5.128, cmd_unpack in the recipe CLI extracts .praison tar archives using raw tar.extract() without validating archive member paths. A .praison bundle containing ../../ entries will write files outside the intended output directory. An attacker who distributes a malicious bundle can overwrite arbitrary files on the victim's filesystem when they run praisonai recipe unpack. This vulnerability is fixed in 4.5.128.

0%
Низкий
5 дней назад
github логотип
GHSA-99g3-w8gr-x37c

PraisonAI vulnerable to arbitrary file write via path traversal in `praisonai recipe unpack`

0%
Низкий
5 дней назад

Уязвимостей на страницу