AVID-2026-R1615
Description
Path Traversal in mintplex-labs/anything-llm (CVE-2024-8248)
Details
A vulnerability in the normalizePath function in mintplex-labs/anything-llm version git 296f041 allows for path traversal, leading to arbitrary file read and write in the storage directory. This can result in privilege escalation from manager to admin. The issue is fixed in version 1.2.2.
Reason for inclusion in AVID: CVE-2024-8248 describes a path traversal vulnerability in the AI-related library mintplex-labs/anything-llm, enabling arbitrary file reads/writes in the storage directory and privilege escalation. This directly concerns AI software stacks and deployment tooling, and affects components used to build/run general-purpose AI systems. The issue is within a software package (dependency) rather than hardware/firmware, and the report provides CVE details, affected version, impact, and a fix, satisfying evidence requirements for AVID curation.
References
- NVD entry
- https://huntr.com/bounties/7d6c3b7a-1116-450d-b539-9c911a97537e
- https://github.com/mintplex-labs/anything-llm/commit/47a5c7126c20e2277ee56e2c7ee11990886a40a7
Affected or Relevant Artifacts
- Developer: mintplex-labs
- Deployer: mintplex-labs
- Artifact Details:
| Type | Name |
|---|---|
| System | mintplex-labs/anything-llm |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.0 |
| Vector String | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| Base Score | 7.2 |
| Base Severity | 🔴 High |
| Attack Vector | NETWORK |
| Attack Complexity | 🟢 Low |
| Privileges Required | 🔴 High |
| User Interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality Impact | 🔴 High |
| Integrity Impact | 🔴 High |
| Availability Impact | 🔴 High |
CWE
| ID | Description |
|---|---|
| CWE-29 | CWE-29 Path Traversal: ‘..\filename’ |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2025-03-20
- Version: 0.3.3
- AVID Entry