๐Ÿ” CVE Alert

CVE-2026-39308

HIGH 7.1

PraisonAI recipe registry publish path traversal allows out-of-root file write

CVSS Score
7.1
EPSS Score
0.1%
EPSS Percentile
18th

PraisonAI is a multi-agent teams system. Prior to 1.5.113, PraisonAI's recipe registry publish endpoint writes uploaded recipe bundles to a filesystem path derived from the bundle's internal manifest.json before it verifies that the manifest name and version match the HTTP route. A malicious publisher can place ../ traversal sequences in the bundle manifest and cause the registry server to create files outside the configured registry root even though the request is ultimately rejected with HTTP 400. This is an arbitrary file write / path traversal issue on the registry host. It affects deployments that expose the recipe registry publish flow. If the registry is intentionally run without a token, any network client that can reach the service can trigger it. If a token is configured, any user with publish access can still exploit it. This vulnerability is fixed in 1.5.113.

CWE CWE-22
Vendor mervinpraison
Product praisonai
Published Apr 7, 2026
Last Updated Apr 9, 2026
Stay Ahead of the Next One

Get instant alerts for mervinpraison praisonai

Be the first to know when new high vulnerabilities affecting mervinpraison praisonai are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
Low

Affected Versions

MervinPraison / PraisonAI
< 4.5.113

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-r9x3-wx45-2v7f