A race condition vulnerability exists in the mintplex-labs/anything-llm repository, specifically within the user invite acceptance process. Attackers can exploit this vulnerability by sending multiple concurrent requests to accept a single user invite, allowing the creation of multiple user accounts from a single invite link intended for only one user. This bypasses the intended security mechanism that restricts invite acceptance to a single user, leading to unauthorized user creation without detection in the invite tab. The issue is due to the lack of validation for concurrent requests in the backend.
References
Link | Resource |
---|---|
https://huntr.com/bounties/a3c69faf-cca0-4c10-8739-57e5bef7a95f | Exploit Third Party Advisory |
https://huntr.com/bounties/a3c69faf-cca0-4c10-8739-57e5bef7a95f | Exploit Third Party Advisory |
Configurations
History
09 Jul 2025, 19:32
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:* | |
First Time |
Mintplexlabs
Mintplexlabs anythingllm |
|
References | () https://huntr.com/bounties/a3c69faf-cca0-4c10-8739-57e5bef7a95f - Exploit, Third Party Advisory |
Information
Published : 2024-05-07 00:15
Updated : 2025-07-09 19:32
NVD link : CVE-2024-2913
Mitre link : CVE-2024-2913
CVE.ORG link : CVE-2024-2913
JSON object : View
Products Affected
mintplexlabs
- anythingllm
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition