PraisonAI Vulnerable to RCE via Automatic tools.py Import
High severity
GitHub Reviewed
Published
Apr 10, 2026
in
MervinPraison/PraisonAI
•
Updated Apr 14, 2026
Description
Published to the GitHub Advisory Database
Apr 10, 2026
Reviewed
Apr 10, 2026
Published by the National Vulnerability Database
Apr 14, 2026
Last updated
Apr 14, 2026
PraisonAI automatically imports
./tools.pyfrom the current working directory when launching certain components. This includes call.py, tool_resolver.py, and CLI tool-loading paths.A malicious tools.py placed in the process working directory is executed immediately, allowing arbitrary Python code execution in the host environment.
Affected Code
import_tools_from_file()_load_local_tools()PoC
Create tools.py in the directory where PraisonAI is launched:
Run any PraisonAI component that loads local tools, for example:
Reproduction Steps
/tmp/pwned.txtor the malicious command output exists.Impact
An attacker who can place or influence tools.py in the working directory can execute arbitrary code in the PraisonAI process, compromising the host and any connected data.
Reporter: Lakshmikanthan K (letchupkt)
References