CVE-2024-3029

In mintplex-labs/anything-llm, an attacker can exploit improper input validation by sending a malformed JSON payload to the '/system/enable-multi-user' endpoint. This triggers an error that is caught by a catch block, which in turn deletes all users and disables the 'multi_user_mode'. The vulnerability allows an attacker to remove all existing users and potentially create a new admin user without requiring a password, leading to unauthorized access and control over the application.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*

History

09 Jul 2025, 19:34

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 9.0
v2 : unknown
v3 : 8.0
References () https://github.com/mintplex-labs/anything-llm/commit/99cfee1e7025fe9a0919a4d506ba1e1b819f6073 - () https://github.com/mintplex-labs/anything-llm/commit/99cfee1e7025fe9a0919a4d506ba1e1b819f6073 - Patch
References () https://huntr.com/bounties/7189a7a0-9830-459d-b853-bdc2559999a0 - () https://huntr.com/bounties/7189a7a0-9830-459d-b853-bdc2559999a0 - Exploit, Third Party Advisory
First Time Mintplexlabs
Mintplexlabs anythingllm

21 Nov 2024, 09:28

Type Values Removed Values Added
References () https://github.com/mintplex-labs/anything-llm/commit/99cfee1e7025fe9a0919a4d506ba1e1b819f6073 - () https://github.com/mintplex-labs/anything-llm/commit/99cfee1e7025fe9a0919a4d506ba1e1b819f6073 -
References () https://huntr.com/bounties/7189a7a0-9830-459d-b853-bdc2559999a0 - () https://huntr.com/bounties/7189a7a0-9830-459d-b853-bdc2559999a0 -

16 Apr 2024, 13:24

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-16 00:15

Updated : 2025-07-09 19:34


NVD link : CVE-2024-3029

Mitre link : CVE-2024-3029

CVE.ORG link : CVE-2024-3029


JSON object : View

Products Affected

mintplexlabs

  • anythingllm
CWE
CWE-20

Improper Input Validation

NVD-CWE-noinfo