Impact
In the affected versions of AnythingLLM (1.11.1 and earlier), the system blocks suspended users when they use the normal JWT‑backed session path, but it fails to block them on the browser extension API key path. Consequently, a suspended user who holds a valid browser extension API key can continue to access browser extension endpoints, read workspace metadata, and perform upload or embed operations even though their regular authenticated requests are rejected. This is an access control bypass that allows a disallowed user to retain access to sensitive data and use of the application.
Affected Systems
The vulnerability affects the Mintplex‑Labs AnythingLLM application, specifically versions 1.11.1 and older. The patch or update required is available for newer releases beyond 1.11.1.
Risk and Exploitability
The CVSS score is 2.7, indicating a low severity vulnerability, and the EPSS score is less than 1%, suggesting a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be remote, via the browser extension API key, and the conditions for exploitation are: the user must be suspended but already possess a valid API key. The impact, while limited to the capabilities authenticated users normally have, can lead to unauthorized data access within the user's own workspace and continued use of the service.
OpenCVE Enrichment