AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. In 1.11.1 and earlier, The ImportedPlugin.importCommunityItemFromUrl() function in server/utils/agents/imported.js downloads a ZIP file from a community hub URL and extracts it using AdmZip.extractAllTo() without validating file paths within the archive. This enables a Zip Slip path traversal attack that can lead to arbitrary code execution.
Metrics
Affected Vendors & Products
References
History
Mon, 16 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mintplexlabs anythingllm
|
|
| CPEs | cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Mintplexlabs anythingllm
|
Mon, 16 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mintplexlabs
Mintplexlabs anything-llm |
|
| Vendors & Products |
Mintplexlabs
Mintplexlabs anything-llm |
Fri, 13 Mar 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. In 1.11.1 and earlier, The ImportedPlugin.importCommunityItemFromUrl() function in server/utils/agents/imported.js downloads a ZIP file from a community hub URL and extracts it using AdmZip.extractAllTo() without validating file paths within the archive. This enables a Zip Slip path traversal attack that can lead to arbitrary code execution. | |
| Title | AnythingLLM has a Zip Slip Path Traversal and Code Execution via Community Hub Plugin Import | |
| Weaknesses | CWE-22 CWE-94 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-03-13T21:25:31.682Z
Updated: 2026-03-16T16:44:38.247Z
Reserved: 2026-03-13T14:33:42.825Z
Link: CVE-2026-32719
Updated: 2026-03-16T16:44:35.552Z
Status : Analyzed
Published: 2026-03-16T14:19:42.837
Modified: 2026-03-16T20:29:53.200
Link: CVE-2026-32719
No data.