Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-31637 | In mintplex-labs/anything-llm, an attacker can exploit improper input validation by sending a malformed JSON payload to the '/system/enable-multi-user' endpoint. This triggers an error that is caught by a catch block, which in turn deletes all users and disables the 'multi_user_mode'. The vulnerability allows an attacker to remove all existing users and potentially create a new admin user without requiring a password, leading to unauthorized access and control over the application. |
Wed, 09 Jul 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mintplexlabs
Mintplexlabs anythingllm |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Mintplexlabs
Mintplexlabs anythingllm |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-09T18:56:41.106Z
Reserved: 2024-03-27T19:10:02.922Z
Link: CVE-2024-3029
Updated: 2024-08-01T19:32:42.609Z
Status : Analyzed
Published: 2024-04-16T00:15:11.850
Modified: 2025-07-09T19:34:23.383
Link: CVE-2024-3029
No data.
OpenCVE Enrichment
No data.
EUVD