| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9mqq-jqxf-grvw | PraisonAI MCP `tools/call` path-traversal => RCE via Python `.pth` injection |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 11 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Praison
Praison praisonai |
|
| CPEs | cpe:2.3:a:praison:praisonai:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Praison
Praison praisonai |
|
| Metrics |
cvssV3_1
|
Fri, 08 May 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PraisonAI is a multi-agent teams system. Prior to version 4.6.34, PraisonAI's MCP (Model Context Protocol) server (praisonai mcp serve) registers four file-handling tools by default — praisonai.rules.create, praisonai.rules.show, praisonai.rules.delete, and praisonai.workflow.show. Each accepts a path or filename string from MCP tools/call arguments and joins it onto ~/.praison/rules/ (or, for workflow.show, accepts an absolute path) with no containment check. The JSON-RPC dispatcher passes params["arguments"] blind to each handler via **kwargs without validating against the advertised input schema. By setting rule_name="../../<some-path>" an attacker walks out of the rules directory and writes any file the running user can write. Dropping a Python .pth file into the user site-packages directory escalates this primitive to arbitrary code execution in any subsequent Python process the user spawns — the next praisonai CLI invocation, an IDE script run, the user's python REPL, or any background Python service. This issue has been patched in version 4.6.34. | |
| Title | PraisonAI MCP `tools/call` path-traversal and RCE via Python `.pth` injection | |
| Weaknesses | CWE-20 CWE-22 CWE-829 CWE-913 CWE-94 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-11T18:33:36.036Z
Reserved: 2026-05-05T19:52:59.147Z
Link: CVE-2026-44336
Updated: 2026-05-11T18:33:07.987Z
Status : Modified
Published: 2026-05-08T14:16:46.437
Modified: 2026-05-11T20:25:46.367
Link: CVE-2026-44336
No data.
OpenCVE Enrichment
Updated: 2026-05-08T22:00:14Z
Github GHSA