Impact
The vulnerability resides in the ImportedPlugin.importCommunityItemFromUrl() function of the AnythingLLM server. It downloads a ZIP archive from a community hub URL and extracts it without validating internal paths. This allows an attacker to craft a malicious ZIP containing dot‑dot path components and arbitrary files, enabling a Zip Slip path traversal that ultimately leads to arbitrary code execution. The weakness corresponds to CWE‑22 (Path Traversal) and CWE‑94 (Code Injection).
Affected Systems
Affecting the Mintplex‑Labs AnythingLLM application, specifically version 1.11.1 and earlier. Identified through the vendor product list Mintplex-Labs:anything-llm and the affected version field in the CVE entry. Newer releases are not impacted.
Risk and Exploitability
The CVSS score of 4.2 indicates a moderate overall threat, and the EPSS score of less than 1% shows a low probability of exploitation in the wild. The vulnerability is not catalogued in CISA’s KEV list. Exploitation requires access to the server’s import feature; an attacker can supply a crafted URL to the community hub and trigger the extraction, resulting in file system overwrites and code execution. The attack vector is network‑based through the import API, but an attacker would need sufficient privileges to configure or instruct the server to import the malicious ZIP.
OpenCVE Enrichment