Vulnerability Description
User can send a chat that contains an XSS opportunity that will then run when the chat is sent and on subsequent page loads. Given the minimum requirement for a user to send a chat is to be given access to a workspace via an admin the risk is low. Additionally, the location in which the XSS renders is only limited to the user who submits the XSS. Ultimately, this attack is limited to the user attacking themselves. There is no anonymous chat submission unless the user does not take the minimum steps required to protect their instance.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mintplexlabs | Anythingllm | - |
Related Weaknesses (CWE)
References
- https://github.com/mintplex-labs/anything-llm/commit/a4ace56a401ffc8ce0082d74441Patch
- https://huntr.com/bounties/53308220-8b2e-492f-b248-0985b7c2db61Third Party Advisory
- https://github.com/mintplex-labs/anything-llm/commit/a4ace56a401ffc8ce0082d74441Patch
- https://huntr.com/bounties/53308220-8b2e-492f-b248-0985b7c2db61Third Party Advisory
FAQ
What is CVE-2024-0435?
CVE-2024-0435 is a vulnerability with a CVSS score of 5.4 (MEDIUM). User can send a chat that contains an XSS opportunity that will then run when the chat is sent and on subsequent page loads. Given the minimum requirement for a user to send a chat is to be given acc...
How severe is CVE-2024-0435?
CVE-2024-0435 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-0435?
Check the references section above for vendor advisories and patch information. Affected products include: Mintplexlabs Anythingllm.