CVE-2024-3028

mintplex-labs/anything-llm is vulnerable to improper input validation, allowing attackers to read and delete arbitrary files on the server. By manipulating the 'logo_filename' parameter in the 'system-preferences' API endpoint, an attacker can construct requests to read sensitive files or the application's '.env' file, and even delete files by setting the 'logo_filename' to the path of the target file and invoking the 'remove-logo' API endpoint. This vulnerability is due to the lack of proper sanitization of user-supplied input.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*

History

09 Jul 2025, 19:34

Type Values Removed Values Added
References () https://github.com/mintplex-labs/anything-llm/commit/7de23dbb2da932fbfb39f56d981784d3702cf5ce - () https://github.com/mintplex-labs/anything-llm/commit/7de23dbb2da932fbfb39f56d981784d3702cf5ce - Patch
References () https://huntr.com/bounties/41016b86-eabb-4161-ac81-40a1ca8e82ac - () https://huntr.com/bounties/41016b86-eabb-4161-ac81-40a1ca8e82ac - Exploit, Third Party Advisory
CPE cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*
First Time Mintplexlabs
Mintplexlabs anythingllm
CWE NVD-CWE-noinfo

21 Nov 2024, 09:28

Type Values Removed Values Added
References () https://github.com/mintplex-labs/anything-llm/commit/7de23dbb2da932fbfb39f56d981784d3702cf5ce - () https://github.com/mintplex-labs/anything-llm/commit/7de23dbb2da932fbfb39f56d981784d3702cf5ce -
References () https://huntr.com/bounties/41016b86-eabb-4161-ac81-40a1ca8e82ac - () https://huntr.com/bounties/41016b86-eabb-4161-ac81-40a1ca8e82ac -

16 Apr 2024, 13:24

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-16 00:15

Updated : 2025-07-09 19:34


NVD link : CVE-2024-3028

Mitre link : CVE-2024-3028

CVE.ORG link : CVE-2024-3028


JSON object : View

Products Affected

mintplexlabs

  • anythingllm
CWE
CWE-20

Improper Input Validation

NVD-CWE-noinfo