๐Ÿ” CVE Alert

CVE-2026-44340

UNKNOWN 0.0

PraisonAI: Symlink-extraction bypass of `_safe_extractall` writes outside `dest_dir`

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

PraisonAI is a multi-agent teams system. Prior to version 4.6.37, the _safe_extractall helper that all recipe pull, recipe publish, and recipe unpack flows route through validates each archive member's name for absolute paths, .. segments, and resolved-path escape โ€” but does not validate member.linkname, does not reject symlink/hardlink members, and calls tar.extractall(dest_dir) without filter="data". A bundle that contains a symlink with a name inside dest_dir but a linkname pointing outside it, followed by a regular file whose path traverses through the just-created symlink, escapes dest_dir and lets the attacker write arbitrary content to an attacker-chosen location on the victim's filesystem. This issue has been patched in version 4.6.37.

CWE CWE-22 CWE-59
Vendor mervinpraison
Product praisonai
Published May 8, 2026
Last Updated May 8, 2026
Stay Ahead of the Next One

Get instant alerts for mervinpraison praisonai

Be the first to know when new unknown vulnerabilities affecting mervinpraison praisonai are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

MervinPraison / PraisonAI
< 4.6.37

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-9q28-ghcr-c4x3