Vulnerability Description
mintplex-labs/anything-llm version latest contains a vulnerability where sensitive information, specifically a password, is improperly stored within a JWT (JSON Web Token) used as a bearer token in single user mode. When decoded, the JWT reveals the password in plaintext. This improper storage of sensitive information poses significant security risks, as an attacker who gains access to the JWT can easily decode it and retrieve the password. The issue is fixed in version 1.0.3.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mintplexlabs | Anythingllm | < 1.2.1 |
Related Weaknesses (CWE)
References
- https://github.com/mintplex-labs/anything-llm/commit/4430ddb05988470bc8f0479e7d0Patch
- https://huntr.com/bounties/20e9950f-ad41-4d6b-8bd0-c7f7051695b3ExploitMitigationThird Party Advisory
FAQ
What is CVE-2024-7783?
CVE-2024-7783 is a vulnerability with a CVSS score of 7.5 (HIGH). mintplex-labs/anything-llm version latest contains a vulnerability where sensitive information, specifically a password, is improperly stored within a JWT (JSON Web Token) used as a bearer token in si...
How severe is CVE-2024-7783?
CVE-2024-7783 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-7783?
Check the references section above for vendor advisories and patch information. Affected products include: Mintplexlabs Anythingllm.