Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32715: CWE-863: Incorrect Authorization in Mintplex-Labs anything-llm

0
Low
VulnerabilityCVE-2026-32715cvecve-2026-32715cwe-863
Published: Fri Mar 13 2026 (03/13/2026, 21:22:00 UTC)
Source: CVE Database V5
Vendor/Project: Mintplex-Labs
Product: anything-llm

Description

CVE-2026-32715 is an authorization vulnerability in Mintplex-Labs' anything-llm application versions 1. 11. 1 and earlier. The flaw arises from inconsistent access controls on system-preferences endpoints, where manager roles can access endpoints restricted to admins elsewhere. This allows managers to read plaintext SQL database credentials and overwrite critical admin-only settings such as the default system prompt and Community Hub API key. The vulnerability has a CVSS score of 3. 8, indicating low severity, with no known exploits in the wild. Exploitation requires network access and manager-level privileges but no user interaction. Organizations using anything-llm should prioritize patching or restricting manager access to these endpoints to prevent potential credential exposure and unauthorized configuration changes.

AI-Powered Analysis

AILast updated: 03/13/2026, 22:00:05 UTC

Technical Analysis

The vulnerability identified as CVE-2026-32715 affects the Mintplex-Labs anything-llm application, specifically versions 1.11.1 and earlier. AnythingLLM is designed to convert content into contextual references usable by large language models (LLMs) during chats. The issue stems from inconsistent authorization enforcement on two generic system-preferences API endpoints. While most interfaces that interact with these settings restrict access exclusively to admin roles, these two endpoints mistakenly allow access to users with the manager role. This discrepancy enables a manager-level user to directly invoke these endpoints to retrieve sensitive information, including plaintext SQL database credentials, which should be strictly protected. Additionally, the attacker can overwrite global settings that are normally admin-only, such as the default system prompt used by the LLM and the Community Hub API key, potentially altering system behavior or enabling further attacks. The vulnerability is categorized under CWE-863 (Incorrect Authorization), highlighting a failure to enforce proper access controls. The CVSS v3.1 base score is 3.8, reflecting low severity due to the requirement of elevated privileges (manager role) and the lack of impact on availability. No public exploits have been reported to date. The vulnerability was published on March 13, 2026, and no official patches have been linked yet. The flaw could be exploited remotely over the network without user interaction but requires authenticated manager-level access, limiting the attack surface to insiders or compromised accounts.

Potential Impact

The primary impact of CVE-2026-32715 is the unauthorized disclosure of sensitive credentials, specifically plaintext SQL database credentials, which can lead to further compromise of the backend database and potentially the entire application infrastructure. Unauthorized modification of admin-only global settings such as the default system prompt and Community Hub API key can disrupt normal application operations, degrade trust in the system's outputs, or enable attackers to pivot to other systems via API abuse. Organizations relying on anything-llm for LLM contextualization may face confidentiality breaches and integrity violations. Although the vulnerability does not impact system availability directly, the exposure of credentials and configuration manipulation can facilitate more severe attacks, including privilege escalation and data exfiltration. The requirement for manager-level privileges reduces the likelihood of external attackers exploiting this flaw but raises concerns about insider threats or compromised manager accounts. Globally, organizations using anything-llm in production environments, especially those handling sensitive data or operating critical AI services, are at risk of data leakage and operational disruption.

Mitigation Recommendations

To mitigate CVE-2026-32715, organizations should immediately audit and restrict manager role permissions to ensure they do not have access to sensitive system-preferences endpoints. Implement strict role-based access control (RBAC) policies that enforce consistent authorization checks across all API surfaces. Until an official patch is released, consider network-level controls such as firewall rules or API gateways to block manager access to the vulnerable endpoints. Monitor logs for unusual access patterns or configuration changes initiated by manager accounts. Rotate SQL database credentials and Community Hub API keys to invalidate any potentially exposed secrets. Encourage the vendor to release a patch that corrects the authorization logic, and plan for prompt deployment once available. Additionally, implement multi-factor authentication (MFA) for all privileged accounts to reduce the risk of credential compromise. Conduct regular security reviews of API endpoints to detect similar authorization inconsistencies proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-13T14:33:42.824Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b485502f860ef943b833f3

Added to database: 3/13/2026, 9:44:48 PM

Last enriched: 3/13/2026, 10:00:05 PM

Last updated: 3/14/2026, 4:47:47 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses