Ad

CVE-2026-40117

HIGH CVSS 3.1: 7.5 EPSS 0.04%
Updated Apr 17, 2026
Praisonaiagents
Parameter Value
CVSS 7.5 (HIGH)
Affected Versions before 1.5.128
Fixed In 1.5.128
Type CWE-862 (Missing Authorization)
Vendor Praisonaiagents
Public PoC No

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, read_skill_file() in skill_tools.py allows reading arbitrary files from the filesystem by accepting an unrestricted skill_path parameter. Unlike file_tools.read_file which enforces workspace boundary confinement, and unlike run_skill_script which requires critical-level approval, read_skill_file has neither protection.

An agent influenced by prompt injection can exfiltrate sensitive files without triggering any approval prompt. This vulnerability is fixed in 1.5.128.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
None
No data modification
Availability
None
No disruption

CVSS Vector v3.1

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Praison Praisonaiagents
cpe:2.3:a:praison:praisonaiagents:*:*:*:*:*:*:*:*
1.5.128