Impact
The vulnerability in AnythingLLM allows a manager user to bypass intended role restrictions and access or modify settings that should be restricted to administrators. By calling generic system-preferences endpoints that incorrectly allow manager role access, the attacker can read plaintext SQL database credentials and overwrite vital global configurations such as the default system prompt and the Community Hub API key. This results in a breach of confidentiality (credential disclosure) and integrity (alteration of system settings), as identified by CWE-863.
Affected Systems
Products: Mintplex-Labs AnythingLLM; Versions: 1.11.1 and earlier. The affected CPE string is cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*.
Risk and Exploitability
The CVSS score of 3.8 indicates low to moderate severity, and the EPSS score of less than 1% suggests a low probability of exploitation. The vulnerability is not currently listed in the CISA KEV catalog. Attackers would need to have an authenticated manager session and could exploit the flaw by sending HTTP requests to the generic system-preferences endpoints; the likely vector is internal or local network access.
OpenCVE Enrichment