Vendor
PraisonAI Unsafe Tool Resolution Vulnerability
2 rules 1 TTP 1 CVEPraisonAI resolves tool names against module globals and `__main__` after failing to match declared tools, allowing an attacker who can influence tool-call names to invoke unintended application callables, leading to potential unauthorized state changes and command execution.
PraisonAI Symlink Extraction Bypass Vulnerability
2 rules 2 TTPs 1 CVEPraisonAI versions 2.7.2 through 4.6.35 are vulnerable to an arbitrary file write due to improper validation of symlinks during archive extraction, affecting `recipe pull`, `recipe publish`, and `recipe unpack` flows.
PraisonAI MCP Path Traversal to RCE via .pth Injection
3 rules 3 TTPsPraisonAI's MCP server is vulnerable to path traversal leading to arbitrary code execution by writing a Python `.pth` file into the user's site-packages directory, triggered via poisoned LLM contexts or unauthenticated HTTP-stream transports due to unvalidated kwargs in the dispatcher and lack of containment checks in file-handling tools.
PraisonAI Legacy API Server Authentication Bypass (CVE-2026-44338)
2 rules 1 TTP 1 CVEPraisonAI ships a legacy Flask API server with authentication disabled by default, allowing any reachable caller to access `/agents` and trigger the configured `agents.yaml` workflow through `/chat` without providing a token (CVE-2026-44338).