Mintplexlabs

Anythingllm

63 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.25%
  • Veröffentlicht 16.04.2024 00:15:07
  • Zuletzt bearbeitet 09.07.2025 19:37:14

mintplex-labs/anything-llm is vulnerable to a relative path traversal attack, allowing unauthorized attackers with a default role account to delete files and folders within the filesystem, including critical database files such as 'anythingllm.db'. T...

Exploit
  • EPSS 0.25%
  • Veröffentlicht 16.04.2024 00:15:07
  • Zuletzt bearbeitet 09.07.2025 19:37:47

A mass assignment vulnerability exists in the `/api/invite/:code` endpoint of the mintplex-labs/anything-llm repository, allowing unauthorized creation of high-privileged accounts. By intercepting and modifying the HTTP request during the account cre...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 10.04.2024 17:15:58
  • Zuletzt bearbeitet 09.07.2025 19:38:00

A stored Cross-Site Scripting (XSS) vulnerability exists in the chat functionality of the mintplex-labs/anything-llm repository, allowing attackers to execute arbitrary JavaScript in the context of a user's session. By manipulating the ChatBot respon...

Exploit
  • EPSS 0.14%
  • Veröffentlicht 10.04.2024 17:15:58
  • Zuletzt bearbeitet 09.07.2025 19:38:24

A Denial of Service (DoS) vulnerability exists in the mintplex-labs/anything-llm repository when the application is running in 'just me' mode with a password. An attacker can exploit this vulnerability by making a request to the endpoint using the [v...

Exploit
  • EPSS 0.18%
  • Veröffentlicht 10.04.2024 17:15:56
  • Zuletzt bearbeitet 09.07.2025 19:49:06

A vulnerability in mintplex-labs/anything-llm allows users with manager roles to escalate their privileges to admin roles through a mass assignment issue. The '/admin/system-preferences' API endpoint improperly authorizes manager-level users to modif...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 10.04.2024 17:15:56
  • Zuletzt bearbeitet 09.07.2025 19:49:24

In mintplex-labs/anything-llm, an improper input validation vulnerability allows attackers to escalate privileges by deactivating 'Multi-User Mode'. By sending a specially crafted curl request with the 'multi_user_mode' parameter set to false, an att...

Exploit
  • EPSS 0.23%
  • Veröffentlicht 10.04.2024 17:15:55
  • Zuletzt bearbeitet 09.07.2025 19:50:01

mintplex-labs/anything-llm is vulnerable to path traversal attacks due to insufficient validation of user-supplied input in the logo filename functionality. Attackers can exploit this vulnerability by manipulating the logo filename to reference files...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 03.03.2024 15:15:07
  • Zuletzt bearbeitet 08.01.2025 14:32:04

As a default user on a multi-user instance of AnythingLLM, you could execute a call to the `/export-data` endpoint of the system and then unzip and read that export that would enable you do exfiltrate data of the system at that save state. This woul...

Exploit
  • EPSS 0.56%
  • Veröffentlicht 02.03.2024 22:15:49
  • Zuletzt bearbeitet 21.01.2025 15:06:36

If an attacked was given access to an instance with the admin or manager role there is no backend authentication that would prevent the attacked from creating a new user with an `admin` role and then be able to use this new account to have elevated p...

Exploit
  • EPSS 0.85%
  • Veröffentlicht 28.02.2024 05:15:08
  • Zuletzt bearbeitet 10.01.2025 15:22:26

A user who is privileged already `manager` or `admin` can set their profile picture via the frontend API using a relative filepath to then user the PFP GET API to download any valid files. The attacker would have to have been granted privileged perm...