CVE-2024-0765

MEDIUM

AnythingLLM - Info Disclosure

Title source: llm
STIX 2.1

Description

As a default user on a multi-user instance of AnythingLLM, you could execute a call to the `/export-data` endpoint of the system and then unzip and read that export that would enable you do exfiltrate data of the system at that save state. This would require the attacked to be granted explicit access to the system, but they can do this at any role. Additionally, post-download, the data is deleted so no evidence would exist that the exfiltration occured.

Scores

CVSS v3 6.5
EPSS 0.0010
EPSS Percentile 27.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-200
Status published
Products (1)
mintplexlabs/anythingllm < 1.0.0
Published Mar 03, 2024
Tracked Since Feb 18, 2026