← Back to CVEs
CVE-2026-40157
N/ADescription
PraisonAI is a multi-agent teams system. Prior to 4.5.128, cmd_unpack in the recipe CLI extracts .praison tar archives using raw tar.extract() without validating archive member paths. A .praison bundle containing ../../ entries will write files outside the intended output directory. An attacker who distributes a malicious bundle can overwrite arbitrary files on the victim's filesystem when they run praisonai recipe unpack. This vulnerability is fixed in 4.5.128.
CVE Details
CVSS v3.1 ScoreN/A
Published4/10/2026
Last Modified4/10/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-22
References
https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-99g3-w8gr-x37c(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.