{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T16:15:02.858","vulnerabilities":[{"cve":{"id":"CVE-2024-10513","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:17.140","lastModified":"2025-07-14T14:01:04.640","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A path traversal vulnerability exists in the 'document uploads manager' feature of mintplex-labs/anything-llm, affecting the latest version prior to 1.2.2. This vulnerability allows users with the 'manager' role to access and manipulate the 'anythingllm.db' database file. By exploiting the vulnerable endpoint '/api/document/move-files', an attacker can move the database file to a publicly accessible directory, download it, and subsequently delete it. This can lead to unauthorized access to sensitive data, privilege escalation, and potential data loss."},{"lang":"es","value":"Existe una vulnerabilidad de path traversal en la función \"Administrador de subida de documentos\" de mintplex-labs/anything-llm, que afecta a las versiones anteriores a la 1.2.2. Esta vulnerabilidad permite a los usuarios con el rol de \"administrador\" acceder y manipular el archivo de base de datos \"anythingllm.db\". Al explotar el endpoint vulnerable \"/api/document/move-files\", un atacante puede mover el archivo de base de datos a un directorio de acceso público, descargarlo y posteriormente eliminarlo. Esto puede provocar acceso no autorizado a datos confidenciales, escalada de privilegios y posible pérdida de datos."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-23"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.2","matchCriteriaId":"49CA730F-D0B7-4FBA-B8ED-A524C40A075D"}]}]}],"references":[{"url":"https://github.com/mintplex-labs/anything-llm/commit/47a5c7126c20e2277ee56e2c7ee11990886a40a7","source":"security@huntr.dev","tags":["Patch"]},{"url":"https://huntr.com/bounties/ad11cecf-161a-4fb1-986f-6f88272cbb9e","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}