Cyber Posture

CVE-2026-5627

HighPublic PoC

Published: 07 April 2026

Published
07 April 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0005 14.3th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-5627 is a high-severity Path Traversal: '\..\filename' (CWE-29) vulnerability in Mintplexlabs Anythingllm. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 14.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

This vulnerability is AI-related — categorised as Other AI Platforms.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of user inputs at application entry points, directly preventing path traversal exploits in loadFlow and deleteFlow methods due to improper handling of file paths.

prevent

Mandates timely remediation of flaws like this path traversal vulnerability through patching to version 1.12.1, eliminating the exploitable code.

prevent

Enforces least privilege to restrict high-privilege (PR:H) access needed for exploitation, limiting the users or processes able to perform arbitrary file operations.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Path traversal in public-facing web app directly enables T1190 (exploit public-facing application) and facilitates T1005 (data from local system) via arbitrary file reads including configs with API keys.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A path traversal vulnerability exists in mintplex-labs/anything-llm versions up to and including 1.9.1, within the `AgentFlows` component. The vulnerability arises from improper handling of user input in the `loadFlow` and `deleteFlow` methods in `server/utils/agentFlows/index.js`. Specifically, the combination of `path.join` and…

more

`normalizePath` allows attackers to bypass directory restrictions and access or delete arbitrary `.json` files on the server. This can lead to information disclosure, such as leaking sensitive configuration files containing API keys, or denial of service by deleting critical files like `package.json`. The issue is resolved in version 1.12.1.

Deeper analysisAI

CVE-2026-5627 is a path traversal vulnerability in mintplex-labs/anything-llm versions up to and including 1.9.1. It affects the AgentFlows component, specifically the loadFlow and deleteFlow methods in server/utils/agentFlows/index.js. The issue stems from improper handling of user input, where the combination of path.join and normalizePath enables attackers to bypass directory restrictions and access or delete arbitrary .json files on the server.

Attackers require high privileges (PR:H) and network access to exploit this vulnerability, which has low complexity (AC:L) and no user interaction (UI:N). Successful exploitation allows reading sensitive files, such as configuration files containing API keys, leading to information disclosure, or deleting critical files like package.json, resulting in denial of service. The CVSS v3.1 base score is 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), with associated CWE-29.

The vulnerability is resolved in anything-llm version 1.12.1. Security practitioners should upgrade to this version for mitigation. The fixing commit is available at https://github.com/mintplex-labs/anything-llm/commit/3444b9b0aa6764d72d53670ab4b1aaccdc6b7017, and further details are in the Huntr bounty report at https://huntr.com/bounties/597d41c5-7ea0-4786-80f4-bd536ec66374.

Details

CWE(s)

Affected Products

mintplexlabs
anythingllm
≤ 1.9.1

AI Security AnalysisAI

AI Category
Other AI Platforms
Risk Domain
N/A
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Matched keywords: llm

CVEs Like This One

CVE-2024-13059Same product: Mintplexlabs Anythingllm
CVE-2026-32628Same product: Mintplexlabs Anythingllm
CVE-2026-24477Same product: Mintplexlabs Anythingllm
CVE-2026-32617Same product: Mintplexlabs Anythingllm
CVE-2026-24478Same product: Mintplexlabs Anythingllm
CVE-2024-6842Same product: Mintplexlabs Anythingllm
CVE-2026-32626Same product: Mintplexlabs Anythingllm
CVE-2025-66608Shared CWE-29
CVE-2024-7033Shared CWE-29
CVE-2026-30828Shared CWE-29

References