An authentication bypass vulnerability exists in AnythingLLM v1.8.5 in via the /api/workspaces endpoint. The endpoint fails to implement proper authentication checks, allowing unauthenticated remote attackers to enumerate and retrieve detailed information about all configured workspaces. Exposed data includes: workspace identifiers (id, name, slug), AI model configurations (chatProvider, chatModel, agentProvider), system prompts (openAiPrompt), operational parameters (temperature, history length, similarity thresholds), vector search settings, chat modes, and timestamps.
References
| Link | Resource |
|---|---|
| https://gist.github.com/Cristliu/0897bceac5fdc2d945304b5087a84f14 | |
| https://gist.github.com/Cristliu/ba529c99abec87102e5ef36435d02a6d | Third Party Advisory |
| https://github.com/Mintplex-Labs/anything-llm/issues | Issue Tracking |
Configurations
History
No history.
Information
Published : 2025-12-18 16:15
Updated : 2026-01-22 18:16
NVD link : CVE-2025-63390
Mitre link : CVE-2025-63390
CVE.ORG link : CVE-2025-63390
JSON object : View
Products Affected
mintplexlabs
- anythingllm
CWE
CWE-306
Missing Authentication for Critical Function
