Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-grrg-5cg9-58pf | PraisonAIAgents: Arbitrary File Read via read_skill_file Missing Workspace Boundary and Approval Gate |
Fri, 17 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Praison
Praison praisonaiagents |
|
| CPEs | cpe:2.3:a:praison:praisonaiagents:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Praison
Praison praisonaiagents |
Fri, 10 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mervinpraison
Mervinpraison praisonaiagents |
|
| Vendors & Products |
Mervinpraison
Mervinpraison praisonaiagents |
Thu, 09 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, read_skill_file() in skill_tools.py allows reading arbitrary files from the filesystem by accepting an unrestricted skill_path parameter. Unlike file_tools.read_file which enforces workspace boundary confinement, and unlike run_skill_script which requires critical-level approval, read_skill_file has neither protection. An agent influenced by prompt injection can exfiltrate sensitive files without triggering any approval prompt. This vulnerability is fixed in 1.5.128. | |
| Title | PraisonAIAgents Affected by Arbitrary File Read via read_skill_file Missing Workspace Boundary and Approval Gate | |
| Weaknesses | CWE-862 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-10T18:14:21.572Z
Reserved: 2026-04-09T01:41:38.537Z
Link: CVE-2026-40117
Updated: 2026-04-10T18:14:17.768Z
Status : Analyzed
Published: 2026-04-09T22:16:35.447
Modified: 2026-04-17T18:23:42.337
Link: CVE-2026-40117
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:28:53Z
Github GHSA