CVE-2024-0549
- EPSS 0.25%
- Veröffentlicht 16.04.2024 00:15:07
- Zuletzt bearbeitet 09.07.2025 19:37:14
mintplex-labs/anything-llm is vulnerable to a relative path traversal attack, allowing unauthorized attackers with a default role account to delete files and folders within the filesystem, including critical database files such as 'anythingllm.db'. T...
CVE-2024-0404
- EPSS 0.25%
- Veröffentlicht 16.04.2024 00:15:07
- Zuletzt bearbeitet 09.07.2025 19:37:47
A mass assignment vulnerability exists in the `/api/invite/:code` endpoint of the mintplex-labs/anything-llm repository, allowing unauthorized creation of high-privileged accounts. By intercepting and modifying the HTTP request during the account cre...
CVE-2024-3570
- EPSS 0.09%
- Veröffentlicht 10.04.2024 17:15:58
- Zuletzt bearbeitet 09.07.2025 19:38:00
A stored Cross-Site Scripting (XSS) vulnerability exists in the chat functionality of the mintplex-labs/anything-llm repository, allowing attackers to execute arbitrary JavaScript in the context of a user's session. By manipulating the ChatBot respon...
CVE-2024-3569
- EPSS 0.14%
- Veröffentlicht 10.04.2024 17:15:58
- Zuletzt bearbeitet 09.07.2025 19:38:24
A Denial of Service (DoS) vulnerability exists in the mintplex-labs/anything-llm repository when the application is running in 'just me' mode with a password. An attacker can exploit this vulnerability by making a request to the endpoint using the [v...
CVE-2024-3283
- EPSS 0.18%
- Veröffentlicht 10.04.2024 17:15:56
- Zuletzt bearbeitet 09.07.2025 19:49:06
A vulnerability in mintplex-labs/anything-llm allows users with manager roles to escalate their privileges to admin roles through a mass assignment issue. The '/admin/system-preferences' API endpoint improperly authorizes manager-level users to modif...
CVE-2024-3101
- EPSS 0.11%
- Veröffentlicht 10.04.2024 17:15:56
- Zuletzt bearbeitet 09.07.2025 19:49:24
In mintplex-labs/anything-llm, an improper input validation vulnerability allows attackers to escalate privileges by deactivating 'Multi-User Mode'. By sending a specially crafted curl request with the 'multi_user_mode' parameter set to false, an att...
CVE-2024-3025
- EPSS 0.23%
- Veröffentlicht 10.04.2024 17:15:55
- Zuletzt bearbeitet 09.07.2025 19:50:01
mintplex-labs/anything-llm is vulnerable to path traversal attacks due to insufficient validation of user-supplied input in the logo filename functionality. Attackers can exploit this vulnerability by manipulating the logo filename to reference files...
CVE-2024-0765
- EPSS 0.1%
- Veröffentlicht 03.03.2024 15:15:07
- Zuletzt bearbeitet 08.01.2025 14:32:04
As a default user on a multi-user instance of AnythingLLM, you could execute a call to the `/export-data` endpoint of the system and then unzip and read that export that would enable you do exfiltrate data of the system at that save state. This woul...
CVE-2024-0795
- EPSS 0.56%
- Veröffentlicht 02.03.2024 22:15:49
- Zuletzt bearbeitet 21.01.2025 15:06:36
If an attacked was given access to an instance with the admin or manager role there is no backend authentication that would prevent the attacked from creating a new user with an `admin` role and then be able to use this new account to have elevated p...
CVE-2024-0550
- EPSS 0.85%
- Veröffentlicht 28.02.2024 05:15:08
- Zuletzt bearbeitet 10.01.2025 15:22:26
A user who is privileged already `manager` or `admin` can set their profile picture via the frontend API using a relative filepath to then user the PFP GET API to download any valid files. The attacker would have to have been granted privileged perm...