Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3152: CWE-918 Server-Side Request Forgery (SSRF) in mintplex-labs mintplex-labs/anything-llm

0
High
VulnerabilityCVE-2024-3152cvecve-2024-3152cwe-918
Published: Thu Jun 06 2024 (06/06/2024, 17:19:15 UTC)
Source: CVE Database V5
Vendor/Project: mintplex-labs
Product: mintplex-labs/anything-llm

Description

mintplex-labs/anything-llm is vulnerable to multiple security issues due to improper input validation in several endpoints. An attacker can exploit these vulnerabilities to escalate privileges from a default user role to an admin role, read and delete arbitrary files on the system, and perform Server-Side Request Forgery (SSRF) attacks. The vulnerabilities are present in the `/request-token`, `/workspace/:slug/thread/:threadSlug/update`, `/system/remove-logo`, `/system/logo`, and collector's `/process` endpoints. These issues are due to the application's failure to properly validate user input before passing it to `prisma` functions and other critical operations. Affected versions include the latest version prior to 1.0.0.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:26:11 UTC

Technical Analysis

CVE-2024-3152 affects mintplex-labs/anything-llm, a software product prior to version 1.0.0, due to multiple security flaws arising from insufficient input validation in several API endpoints. The vulnerability allows attackers to exploit Server-Side Request Forgery (SSRF) attacks by manipulating requests to internal or external resources, potentially bypassing network restrictions. Additionally, attackers can escalate privileges from default user roles to administrative roles, enabling unauthorized access to sensitive functions. The flaws also permit reading and deleting arbitrary files on the host system, which can lead to data loss or system compromise. The root cause is the application's failure to properly sanitize and validate user inputs before passing them to Prisma ORM functions and other critical backend operations, leading to injection-like behaviors and SSRF vectors. The affected endpoints include /request-token, /workspace/:slug/thread/:threadSlug/update, /system/remove-logo, /system/logo, and the collector's /process endpoint. The CVSS 3.0 score of 8.8 indicates a high-severity vulnerability with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the combination of SSRF and privilege escalation makes this a critical risk for deployments of this software, especially in environments with sensitive data or critical infrastructure.

Potential Impact

For European organizations using mintplex-labs/anything-llm, this vulnerability poses significant risks including unauthorized administrative access, data exfiltration, and potential system disruption. SSRF can be leveraged to access internal services that are otherwise protected by network segmentation, potentially exposing internal APIs, metadata services, or other sensitive resources. Privilege escalation allows attackers to gain full control over the application, facilitating further attacks such as data manipulation, deletion, or lateral movement within the network. The ability to read and delete arbitrary files increases the risk of data breaches and operational downtime. Given the high CVSS score and the critical nature of the affected operations, organizations handling sensitive or regulated data (e.g., financial, healthcare, governmental) face compliance and reputational risks. The lack of known exploits in the wild provides a window for proactive mitigation, but the vulnerability’s severity demands urgent attention to prevent exploitation.

Mitigation Recommendations

European organizations should immediately audit their deployments of mintplex-labs/anything-llm to identify affected versions and endpoints. Since no official patches are listed, organizations must implement strict input validation and sanitization at all entry points, especially those identified (/request-token, /workspace/:slug/thread/:threadSlug/update, /system/remove-logo, /system/logo, /process). Employ allowlisting for URLs and parameters used in SSRF-prone functions to restrict outbound requests to trusted destinations only. Implement robust access controls and role-based permissions to limit privilege escalation opportunities. Monitor logs for unusual access patterns or unexpected requests to sensitive endpoints. Network segmentation should be enforced to limit SSRF impact by isolating internal services from the application server. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SSRF payloads and injection attempts. Finally, maintain close communication with the vendor for patches or updates and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-04-01T17:59:27.559Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b26178f764e1f470b7d

Added to database: 10/15/2025, 1:01:26 PM

Last enriched: 10/15/2025, 1:26:11 PM

Last updated: 10/16/2025, 2:44:57 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats