{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T03:06:16.319","vulnerabilities":[{"cve":{"id":"CVE-2024-0439","sourceIdentifier":"security@huntr.dev","published":"2024-02-26T16:27:50.490","lastModified":"2025-02-27T02:42:37.823","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"As a manager, you should not be able to modify a series of settings. In the UI this is indeed hidden as a convenience for the role since most managers would not be savvy enough to modify these settings. They can use their token to still modify those settings though through a standard HTTP request\n\nWhile this is not a critical vulnerability, it does indeed need to be patched to enforce the expected permission level."},{"lang":"es","value":"Como administrador, no debería poder modificar una serie de configuraciones. De hecho, en la interfaz de usuario esto está oculto como una conveniencia para el rol, ya que la mayoría de los gerentes no serían lo suficientemente inteligentes como para modificar esta configuración. Pueden usar su token para modificar esa configuración a través de una solicitud HTTP estándar. Si bien esta no es una vulnerabilidad crítica, de hecho es necesario parchearla para aplicar el nivel de permiso esperado."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":4.2}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-269"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.0","matchCriteriaId":"0D667E32-5A5C-479C-BB81-47F3BCA38C13"}]}]}],"references":[{"url":"https://github.com/mintplex-labs/anything-llm/commit/7200a06ef07d92eef5f3c4c8be29824aa001d688","source":"security@huntr.dev","tags":["Patch"]},{"url":"https://huntr.com/bounties/7fc1b78e-7faf-4f40-961d-61e53dac81ce","source":"security@huntr.dev","tags":["Exploit"]},{"url":"https://github.com/mintplex-labs/anything-llm/commit/7200a06ef07d92eef5f3c4c8be29824aa001d688","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://huntr.com/bounties/7fc1b78e-7faf-4f40-961d-61e53dac81ce","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]}]}}]}