CVE-2026-5627
Published: 07 April 2026
Summary
CVE-2026-5627 is a high-severity Path Traversal: '\..\filename' (CWE-29) vulnerability in Mintplexlabs Anythingllm. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 14.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
This vulnerability is AI-related — categorised as Other AI Platforms.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of user inputs at application entry points, directly preventing path traversal exploits in loadFlow and deleteFlow methods due to improper handling of file paths.
Mandates timely remediation of flaws like this path traversal vulnerability through patching to version 1.12.1, eliminating the exploitable code.
Enforces least privilege to restrict high-privilege (PR:H) access needed for exploitation, limiting the users or processes able to perform arbitrary file operations.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal in public-facing web app directly enables T1190 (exploit public-facing application) and facilitates T1005 (data from local system) via arbitrary file reads including configs with API keys.
NVD Description
A path traversal vulnerability exists in mintplex-labs/anything-llm versions up to and including 1.9.1, within the `AgentFlows` component. The vulnerability arises from improper handling of user input in the `loadFlow` and `deleteFlow` methods in `server/utils/agentFlows/index.js`. Specifically, the combination of `path.join` and…
more
`normalizePath` allows attackers to bypass directory restrictions and access or delete arbitrary `.json` files on the server. This can lead to information disclosure, such as leaking sensitive configuration files containing API keys, or denial of service by deleting critical files like `package.json`. The issue is resolved in version 1.12.1.
Deeper analysisAI
CVE-2026-5627 is a path traversal vulnerability in mintplex-labs/anything-llm versions up to and including 1.9.1. It affects the AgentFlows component, specifically the loadFlow and deleteFlow methods in server/utils/agentFlows/index.js. The issue stems from improper handling of user input, where the combination of path.join and normalizePath enables attackers to bypass directory restrictions and access or delete arbitrary .json files on the server.
Attackers require high privileges (PR:H) and network access to exploit this vulnerability, which has low complexity (AC:L) and no user interaction (UI:N). Successful exploitation allows reading sensitive files, such as configuration files containing API keys, leading to information disclosure, or deleting critical files like package.json, resulting in denial of service. The CVSS v3.1 base score is 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), with associated CWE-29.
The vulnerability is resolved in anything-llm version 1.12.1. Security practitioners should upgrade to this version for mitigation. The fixing commit is available at https://github.com/mintplex-labs/anything-llm/commit/3444b9b0aa6764d72d53670ab4b1aaccdc6b7017, and further details are in the Huntr bounty report at https://huntr.com/bounties/597d41c5-7ea0-4786-80f4-bd536ec66374.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Other AI Platforms
- Risk Domain
- N/A
- OWASP Top 10 for LLMs 2025
- None mapped
- Classification Reason
- Matched keywords: llm