mintplex-labs/anything-llm is vulnerable to path traversal attacks due to insufficient validation of user-supplied input in the logo filename functionality. Attackers can exploit this vulnerability by manipulating the logo filename to reference files outside of the restricted directory. This can lead to unauthorized reading or deletion of files by utilizing the `/api/system/upload-logo` and `/api/system/logo` endpoints. The issue stems from the lack of filtering or validation on the logo filename, allowing attackers to target sensitive files such as the application's database.
Metrics
Affected Vendors & Products
References
History
Wed, 09 Jul 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mintplexlabs
Mintplexlabs anythingllm |
|
CPEs | cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:* | |
Vendors & Products |
Mintplexlabs
Mintplexlabs anythingllm |

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-04-10T17:07:52.626Z
Updated: 2024-08-01T19:32:42.584Z
Reserved: 2024-03-27T18:53:48.186Z
Link: CVE-2024-3025

Updated: 2024-08-01T19:32:42.584Z

Status : Analyzed
Published: 2024-04-10T17:15:55.993
Modified: 2025-07-09T19:50:01.460
Link: CVE-2024-3025

No data.