Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 16 Mar 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mintplexlabs anythingllm
|
|
| CPEs | cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Mintplexlabs anythingllm
|
|
| Metrics |
cvssV3_1
|
Mon, 16 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mintplexlabs
Mintplexlabs anything-llm |
|
| Vendors & Products |
Mintplexlabs
Mintplexlabs anything-llm |
Fri, 13 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. In 1.11.1 and earlier, a SQL injection vulnerability in the built-in SQL Agent plugin allows any user who can invoke the agent to execute arbitrary SQL commands on connected databases. The getTableSchemaSql() method in all three database connectors (MySQL, PostgreSQL, MSSQL) constructs SQL queries using direct string concatenation of the table_name parameter without sanitization or parameterization. | |
| Title | AnythingLLM has SQL Injection in Built-in SQL Agent Plugin via Unsanitized table_name Parameter | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-16T15:41:05.437Z
Reserved: 2026-03-12T15:29:36.558Z
Link: CVE-2026-32628
Updated: 2026-03-16T15:31:37.226Z
Status : Analyzed
Published: 2026-03-16T14:19:40.447
Modified: 2026-03-16T20:33:27.493
Link: CVE-2026-32628
No data.
OpenCVE Enrichment
Updated: 2026-03-16T09:22:58Z