griptape — Path traversal CVE-2026-5595 affects AI agent file operations

AI relevance: griptape is a popular framework for building AI agents with tool usage capabilities, so path traversal vulnerabilities in its file operations directly impact the security boundaries of automated AI workflows that handle sensitive files.

  • CVE-2026-5595 affects griptape-ai griptape version 0.19.4
  • The vulnerability allows path traversal attacks via the FileManagerTool component
  • Multiple functions are affected: load_files_from_disk, list_files_from_disk, save_content_to_file, save_memory_artifacts_to_disk
  • The flaw has a CVSS 3.1 score of 6.3 (Medium severity)
  • Attackers can access arbitrary files on the filesystem
  • The vendor was contacted but has not responded or released patches
  • This demonstrates file operation risks in AI agent frameworks
  • The vulnerability was publicly disclosed on April 5, 2026
  • Remote exploitation is possible with no user interaction required

Why it matters

AI agent frameworks like griptape often handle sensitive file operations as part of their workflow automation. Path traversal vulnerabilities in these systems can lead to unauthorized access to critical files, configuration data, or credentials, potentially compromising entire AI agent deployments and the systems they interact with.

What to do

  • Check griptape version: Verify if you're running affected version (0.19.4)
  • Monitor for updates: Watch for official patches from griptape-ai
  • Review file operations: Audit how file paths are validated and sanitized
  • Implement access controls: Restrict file system permissions for AI agents
  • Consider sandboxing: Run AI agents in isolated environments with limited filesystem access

Sources