Impact
AnythingLLM version 1.11.1 and earlier contain a SQL injection flaw in the built‑in SQL Agent plugin. The getTableSchemaSql() method concatenates the user‑supplied table_name parameter directly into SQL statements for MySQL, PostgreSQL, and MSSQL connectors without sanitization or parameterization. This allows an attacker who can invoke the agent to execute arbitrary SQL commands on any database the application is connected to, potentially compromising confidentiality, integrity, and availability of that data. The weakness is classified as CWE‑89, SQL Injection.
Affected Systems
The affected system is the AnythingLLM application from Mintplex‑Labs. Versions 1.11.1 and earlier are vulnerable. The relevant CPE is cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*. Users should verify their installed version and vendor name against the product specifications.
Risk and Exploitability
The vulnerability has a CVSS score of 7.7, indicating high severity, but an EPSS score of less than 1 % suggests a low probability of exploitation at present. It is not listed in the CISA KEV catalog. The likely attack vector is through the agent’s API or user interface; any user with the ability to invoke the agent can supply a malicious table_name value. The impact is limited to the database(s) that the agent connects to, but could be significant if sensitive data lies there.
OpenCVE Enrichment