CVE-2026-40148
Zip Bomb Decompression Vulnerability in PraisonAI Recipe Registry
Publication date: 2026-04-09
Last updated on: 2026-04-17
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| praison | praisonai | to 4.5.128 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-409 | The product does not handle or incorrectly handles a compressed input with a very high compression ratio that produces a large output. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability exists in PraisonAI's _safe_extractall() function prior to version 4.5.128. While it validates archive members against path traversal attacks, it does not check individual member sizes, the total extracted size, or the number of members before extracting the archive. An attacker can exploit this by publishing a malicious recipe bundle containing highly compressible data that decompresses to a very large size, potentially exhausting the victim's disk space when the bundle is pulled.
How can this vulnerability impact me? :
This vulnerability can lead to denial of service by exhausting the disk space of the system where PraisonAI is running. An attacker can cause the system to run out of disk space by making it extract a large amount of data from a maliciously crafted archive, potentially disrupting normal operations or causing crashes.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, upgrade PraisonAI to version 4.5.128 or later, where the issue with _safe_extractall() has been fixed.