PT-2026-25378 · Mintplex+2 · Anything-Llm

Jackfromeast

+1

·

Published

2026-03-13

·

Updated

2026-03-22

·

CVE-2026-32626

CVSS v3.1

9.6

Critical

AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions AnythingLLM versions 1.11.1 and earlier
Description AnythingLLM is an application designed to enhance Large Language Models (LLMs) by providing contextual information from content. A Streaming Phase Cross-Site Scripting (XSS) issue exists in the chat rendering pipeline, potentially leading to Remote Code Execution (RCE) on the host operating system. This is due to an insecure Electron configuration, specifically the combination of nodeIntegration: true and contextIsolation: false. The vulnerability arises from the interpolation of token content directly into the alt attribute within the custom markdown-it image renderer located in frontend/src/utils/chat/markdown.js without proper HTML entity escaping. The PromptReply component then renders this output using dangerouslySetInnerHTML without DOMPurify sanitization, unlike the HistoricalMessage component which correctly applies DOMPurify.sanitize(). An attacker can exploit this by influencing the content generated by the LLM, such as through poisoned Retrieval-Augmented Generation (RAG) documents or compromised LLM endpoints, to achieve full host compromise.
Recommendations Update to version 1.11.2 or later.

Exploit

Fix

XSS

Weakness Enumeration

Related Identifiers

CVE-2026-32626
GHSA-RRMW-2J6X-4MF2

Affected Products

Anything-Llm