[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-39305":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-07T21:11:43.830Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":40,"aliases":41,"duplicate_of":9,"upstream":43,"downstream":44,"duplicates":45,"related":46,"reserved_at":9,"published_at":47,"modified_at":48,"state":49,"summary":50,"references_raw":57,"kevs":75,"epss":9,"epss_history":76,"metrics":77,"affected":87},"CVE-2026-39305","PraisonAI is a multi-agent teams system. Prior to 1.5.113, the Action Orchestrator feature contains a Path Traversal vulnerability that allows an attacker (or compromised agent) to write to arbitrary files outside of the configured workspace directory. By supplying relative path segments (../) in the target path, malicious actions can overwrite sensitive system files or drop executable payloads on the host. This vulnerability is fixed in 1.5.113.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-22","Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.","weakness","Stable","Base","High",[20,24,28,32,36],{"id":21,"name":22,"techniques":23},"CAPEC-126","Path Traversal",[],{"id":25,"name":26,"techniques":27},"CAPEC-64","Using Slashes and URL Encoding Combined to Bypass Validation Logic",[],{"id":29,"name":30,"techniques":31},"CAPEC-76","Manipulating Web Input to File System Calls",[],{"id":33,"name":34,"techniques":35},"CAPEC-78","Using Escaped Slashes in Alternate Encoding",[],{"id":37,"name":38,"techniques":39},"CAPEC-79","Using Slashes in Alternate Encoding",[],[],[42],"GHSA-jfxc-v5g9-38xr",[],[],[],[],"2026-04-07T16:47:18.102Z","2026-04-07T17:27:47.512Z","Received",{"cisa_kev":51,"cisa_ransomware":51,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":52,"severity_score":53,"severity_version":54,"severity_source":55,"severity_vector":56,"severity_status":49},false,"critical",9,"v3.1","cve.org","CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H",[58,66,71],{"url":59,"sources":60,"tags":63},"https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-jfxc-v5g9-38xr",[61,55,62],"osv_pypi","nvd",[64,65],"WEB","X Refsource CONFIRM",{"url":67,"sources":68,"tags":69},"https://github.com/MervinPraison/PraisonAI",[61],[70],"PACKAGE",{"url":72,"sources":73,"tags":74},"https://github.com/MervinPraison/PraisonAI/releases/tag/v4.5.113",[61],[64],[],[],[78,82,85],{"source":61,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":79,"cvss_v4_0":9},{"baseScore":53,"baseSeverity":9,"vectorString":56,"impactScore":80,"exploitabilityScore":81},9.7,6.4,{"source":55,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":83,"cvss_v4_0":9},{"baseScore":53,"baseSeverity":84,"vectorString":56,"impactScore":80,"exploitabilityScore":81},"CRITICAL",{"source":62,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":86,"cvss_v4_0":9},{"baseScore":53,"baseSeverity":84,"vectorString":56,"impactScore":80,"exploitabilityScore":81},[88,99],{"ecosystem":9,"name":89,"vendor":90,"product":91,"cpe_part":92,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":93},"PraisonAI","mervinpraison","praisonai","a",[94],{"version":95,"is_range":96,"range_type":55,"version_start":9,"version_start_type":9,"version_end":97,"version_end_type":98,"fixed_in":9},"\u003C 4.5.113",true,"4.5.113","excluding",{"ecosystem":100,"name":91,"vendor":100,"product":91,"cpe_part":9,"purl_type":101,"purl_namespace":9,"purl_name":91,"source":9,"versions":102},"PyPI","pypi",[103],{"version":104,"is_range":96,"range_type":105,"version_start":9,"version_start_type":9,"version_end":97,"version_end_type":98,"fixed_in":9},"lt4_5_113","ecosystem"]