CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
AI Score
Confidence
Low
SSVC
Exploitation
poc
Automatable
no
Technical Impact
total
In mintplex-labs/anything-llm, an attacker can exploit improper input validation by sending a malformed JSON payload to the ‘/system/enable-multi-user’ endpoint. This triggers an error that is caught by a catch block, which in turn deletes all users and disables the ‘multi_user_mode’. The vulnerability allows an attacker to remove all existing users and potentially create a new admin user without requiring a password, leading to unauthorized access and control over the application.
[
{
"cpes": [
"cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*"
],
"vendor": "mintplexlabs",
"product": "anythingllm",
"versions": [
{
"status": "affected",
"version": "0",
"lessThan": "1.0.0",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
AI Score
Confidence
Low
SSVC
Exploitation
poc
Automatable
no
Technical Impact
total