A vulnerability in mintplex-labs/anything-llm allows for a denial of service (DoS) condition through the modification of a user's `id` attribute to a value of 0. This issue affects the current version of the software, with the latest commit id `57984fa85c31988b2eff429adfc654c46e0c342a`. By exploiting this vulnerability, an attacker, with manager or admin privileges, can render a chosen account completely inaccessible. The application's mechanism for suspending accounts does not provide a means to reverse this condition through the UI, leading to uncontrolled resource consumption. The vulnerability is introduced due to the lack of input validation and sanitization in the user modification endpoint and the middleware's token validation logic. This issue has been addressed in version 1.0.0 of the software.
References
Link | Resource |
---|---|
https://github.com/mintplex-labs/anything-llm/commit/1b35bcbeab10b77e6dbd263cceecf1b965a40789 | Patch |
https://huntr.com/bounties/a5f45596-0aef-49e0-9f7d-63f1955a1552 | Exploit Third Party Advisory |
https://github.com/mintplex-labs/anything-llm/commit/1b35bcbeab10b77e6dbd263cceecf1b965a40789 | Patch |
https://huntr.com/bounties/a5f45596-0aef-49e0-9f7d-63f1955a1552 | Exploit Third Party Advisory |
Configurations
History
10 Jul 2025, 16:14
Type | Values Removed | Values Added |
---|---|---|
First Time |
Mintplexlabs
Mintplexlabs anythingllm |
|
CWE | NVD-CWE-noinfo | |
References | () https://github.com/mintplex-labs/anything-llm/commit/1b35bcbeab10b77e6dbd263cceecf1b965a40789 - Patch | |
References | () https://huntr.com/bounties/a5f45596-0aef-49e0-9f7d-63f1955a1552 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:* |
Information
Published : 2024-05-19 23:15
Updated : 2025-07-10 16:14
NVD link : CVE-2024-4284
Mitre link : CVE-2024-4284
CVE.ORG link : CVE-2024-4284
JSON object : View
Products Affected
mintplexlabs
- anythingllm
CWE