Impact
A path traversal flaw in the AgentFlows component of mintplex-labs/anything-llm allows an attacker to supply crafted file names to the loadFlow and deleteFlow functions, enabling arbitrary reading or deletion of .json files on the server. This vulnerability can expose sensitive configuration data, such as API keys, and can delete critical files like package.json, leading to data loss or denial of service. The weakness is a classic CWE‑29 type path validation defect.
Affected Systems
The issue affects all installations of mintplex-labs/anything‑llm up through version 1.9.1. The flaw is limited to the AgentFlows API endpoints and is fixed in release 1.12.1. Users running the earlier releases should verify their version and plan an upgrade.
Risk and Exploitability
With a CVSS score of 7.2 the vulnerability is considered high; its exploitability relies on sending crafted requests to the vulnerable endpoints. Attackers can trigger the flaw remotely via the exposed API; the attack vector is inferred to require authentication or network access, as the vulnerability is only reachable through the API endpoints. The EPSS score of < 1% indicates a very low but nonzero exploitation probability, and the vulnerability has not been catalogued in the CISA KEV list, but the high score indicates a significant risk.
OpenCVE Enrichment