CVE-2026-39305
PraisonAI · PraisonAI
A Path Traversal vulnerability in the PraisonAI Action Orchestrator allows attackers to read or write arbitrary files on the host system.
Executive summary
A critical Path Traversal flaw in PraisonAI enables attackers to overwrite sensitive files or execute payloads via the Action Orchestrator.
Vulnerability
The Action Orchestrator fails to sanitize input paths, permitting the use of directory traversal sequences (../). This allows an attacker to escape the designated workspace directory and perform unauthorized file system operations.
Business impact
With a CVSS score of 9.0, this vulnerability allows for significant system-level impact. Attackers can gain persistence, modify configuration files, or overwrite binaries, leading to total compromise of the PraisonAI host.
Remediation
Immediate Action: Upgrade PraisonAI to version 1.5.113 or later to patch the path validation logic.
Proactive Monitoring: Monitor file system activity logs for unauthorized modifications to sensitive directories and binary files.
Compensating Controls: Run the application within a containerized environment with a read-only root file system and strictly limited volume mounts.
Exploitation status
Public Exploit Available: No
Analyst recommendation
Path traversal vulnerabilities in orchestration systems are extremely dangerous. Organizations must upgrade to version 1.5.113 immediately to prevent potential remote code execution or system file tampering.