{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T07:00:15.170","vulnerabilities":[{"cve":{"id":"CVE-2026-32617","sourceIdentifier":"security-advisories@github.com","published":"2026-03-16T14:19:39.630","lastModified":"2026-03-16T20:40:06.763","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. In 1.11.1 and earlier, On default installations where no password or API key has been configured, all HTTP endpoints and the agent WebSocket lack authentication, and the server's CORS policy accepts any origin. AnythingLLM Desktop binds to 127.0.0.1 (loopback) by default. Modern browsers (Chrome, Edge, Firefox) implement Private Network Access (PNA). This explicitly blocks public websites from making requests to local IP addresses. Exploitation is only viable from within the same local network (LAN) due to browser-level blocking of public-to-private requests."},{"lang":"es","value":"AnythingLLM es una aplicación que convierte piezas de contenido en contexto que cualquier LLM puede usar como referencias durante el chat. En 1.11.1 y versiones anteriores, en instalaciones predeterminadas donde no se ha configurado ninguna contraseña o clave de API, todos los puntos finales HTTP y el WebSocket del agente carecen de autenticación, y la política CORS del servidor acepta cualquier origen. AnythingLLM Desktop se enlaza a 127.0.0.1 (loopback) por defecto. Los navegadores modernos (Chrome, Edge, Firefox) implementan el Acceso a Red Privada (PNA). Esto bloquea explícitamente que los sitios web públicos realicen solicitudes a direcciones IP locales. La explotación solo es viable desde dentro de la misma red local (LAN) debido al bloqueo a nivel de navegador de las solicitudes de público a privado."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":1.6,"impactScore":5.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.6,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-942"},{"lang":"en","value":"CWE-1188"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*","versionEndIncluding":"1.11.1","matchCriteriaId":"384FD8C3-E046-493C-9996-8E3042229081"}]}]}],"references":[{"url":"https://github.com/Mintplex-Labs/anything-llm/security/advisories/GHSA-24qj-pw4h-3jmm","source":"security-advisories@github.com","tags":["Vendor Advisory","Exploit"]}]}}]}