oss-sec mailing list archives
Agno's PythonTools: Path traversal leads to sensitive information disclosure and potential RCE
From: Ali Raza <aliraza () bluerock io>
Date: Tue, 27 Jan 2026 15:52:22 +0500
---------- Forwarded message --------- From: Yuvaraj Shanmugam <yuvi () agno com> Date: Thu, Jan 8, 2026 at 7:49 PM Subject: Re: Found a Critical Vulnerability in Agno's PythonTools To: Ali Raza <aliraza () bluerock io> Cc: <support () agno com> Hi Ali, Thank you for sharing this critical vulnerability report regarding PythonTools and for providing the detailed proof-of-concept. We appreciate you bringing this to our attention! Best, Yuvaraj On Wed, 7 Jan 2026 at 10:14, 'Ali Raza' via Agno Support <support () agno com> wrote:
Hi Team, Happy New Year! We have identified and confirmed a critical path traversal vulnerability that leads to sensitive information disclosure and potential Remote Code Execution (RCE). Specifically, PythonTools in libs/agno/agno/tools/python.py constructs file paths using self.base_dir.joinpath(file_name) without validating that the resolved path remains within base_dir. An attacker controlling the tool input (either directly or via an agent prompt) can use ../ to traverse the file system to read, write, or execute files. Please see the attached proof-of-concept code snippet, which utilizes existing cookbook examples to demonstrate this issue. [image: image.png] We intend to post a detailed advisory report on GitHub under the repository's security advisories, provide a patch, and request a CVE number. Please let us know if you require any additional information from us. Best regards, Ali Raza (a.k.a locus-x64) Vulnerability Researcher [image: image.png]
------------------------------ Hi Team, I am forwarding details regarding a critical path traversal vulnerability identified in Agno's PythonTools. The vulnerability resides in libs/agno/agno/tools/python.py, where file paths are constructed using self.base_dir.joinpath(file_name) without proper validation. This allows an attacker to traverse the file system to read, write, or execute files. Please note that a patch has already been implemented by the maintainers in the following commit: https://github.com/agno-agi/agno/commit/710d7e7f846f93b7a3eadfd3e77075428c39e803 We are currently waiting for a CVE to be assigned to this issue. Best, Ali Raza Vulnerability Researcher
Current thread:
- Agno's PythonTools: Path traversal leads to sensitive information disclosure and potential RCE Ali Raza (Jan 27)

