Path Traversal in mintplex-labs/anything-llm
Summary
| CVE | CVE-2026-5627 |
|---|---|
| State | PUBLISHED |
| Assigner | @huntr_ai |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-07 14:16:24 UTC |
| Updated | 2026-04-08 21:27:15 UTC |
| Description | A path traversal vulnerability exists in mintplex-labs/anything-llm versions up to and including 1.9.1, within the `AgentFlows` component. The vulnerability arises from improper handling of user input in the `loadFlow` and `deleteFlow` methods in `server/utils/agentFlows/index.js`. Specifically, the combination of `path.join` and `normalizePath` allows attackers to bypass directory restrictions and access or delete arbitrary `.json` files on the server. This can lead to information disclosure, such as leaking sensitive configuration files containing API keys, or denial of service by deleting critical files like `package.json`. The issue is resolved in version 1.12.1. |
Risk And Classification
Primary CVSS: v3.0 9.1 CRITICAL from [email protected]
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS: 0.000440000 probability, percentile 0.134450000 (date 2026-04-13)
Problem Types: CWE-29 | CWE-29 CWE-29 Path Traversal: '\..\filename'
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.0 | [email protected] | Secondary | 9.1 | CRITICAL | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
| 3.0 | CNA | DECLARED | 9.1 | CRITICAL | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
CVSS v3.0 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
HighUser Interaction
NoneScope
ChangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Mintplex-labs | Mintplex-labs/anything-llm | affected unspecified 1.12.1 custom | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| github.com/mintplex-labs/anything-llm/commit/3444b9b0aa6764d72d53670ab4b... | [email protected] | github.com | |
| huntr.com/bounties/597d41c5-7ea0-4786-80f4-bd536ec66374 | [email protected] | huntr.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.