Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13060: CWE-862 Missing Authorization in mintplex-labs mintplex-labs/anything-llm

0
Medium
VulnerabilityCVE-2024-13060cvecve-2024-13060cwe-862
Published: Thu Mar 20 2025 (03/20/2025, 10:08:46 UTC)
Source: CVE Database V5
Vendor/Project: mintplex-labs
Product: mintplex-labs/anything-llm

Description

A vulnerability in AnythingLLM Docker version 1.3.1 allows users with 'Default' permission to access other users' profile pictures by changing the 'id' parameter in the user cookie. This issue is present in versions prior to 1.3.1.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:24:51 UTC

Technical Analysis

CVE-2024-13060 identifies a missing authorization vulnerability (CWE-862) in the AnythingLLM Docker container version prior to 1.3.1, developed by mintplex-labs. The flaw allows users assigned the 'Default' permission level to access other users' profile pictures by altering the 'id' parameter within their user cookie. This parameter manipulation bypasses intended access controls, exposing user-specific data without proper authorization verification. The vulnerability affects confidentiality but does not impact data integrity or system availability. Exploitation requires the attacker to be authenticated with at least default user permissions but does not require additional user interaction. The CVSS v3.0 base score is 4.3 (medium), reflecting the network attack vector, low complexity, and limited impact scope. No public exploits or patches are currently documented, emphasizing the need for proactive mitigation. This vulnerability highlights the importance of robust authorization checks on user-specific resources in web applications and containerized environments, especially those handling user profile data.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of user profile pictures, potentially violating privacy regulations such as GDPR if personal data is involved. Although the impact is limited to confidentiality and does not affect system integrity or availability, the exposure of user data can undermine user trust and may result in reputational damage. Organizations using AnythingLLM in sectors handling sensitive or regulated data (e.g., healthcare, finance, public sector) are at higher risk. The vulnerability could also be leveraged as part of a broader reconnaissance effort by attackers to gather user information for social engineering or targeted attacks. Since exploitation requires authenticated access, insider threats or compromised accounts pose a significant risk vector. The lack of known exploits reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

European organizations should immediately verify the version of AnythingLLM deployed and upgrade to version 1.3.1 or later where the vulnerability is fixed. If upgrading is not immediately feasible, implement strict access control mechanisms to validate user permissions on all endpoints serving user-specific data, especially those relying on cookie parameters. Employ web application firewalls (WAFs) to detect and block anomalous requests that manipulate cookie parameters. Conduct regular audits of user access logs to identify suspicious access patterns. Enforce strong authentication and session management practices to reduce the risk of account compromise. Additionally, consider isolating the AnythingLLM service within segmented network zones to limit lateral movement in case of exploitation. Finally, inform users about the importance of safeguarding their credentials and monitor threat intelligence sources for emerging exploit techniques related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-12-30T22:30:53.491Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b25178f764e1f470b1e

Added to database: 10/15/2025, 1:01:25 PM

Last enriched: 10/15/2025, 1:24:51 PM

Last updated: 11/30/2025, 9:08:14 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats