AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. In 1.11.1 and earlier, AnythingLLM Desktop contains a Streaming Phase XSS vulnerability in the chat rendering pipeline that escalates to Remote Code Execution on the host OS due to insecure Electron configuration. This works with default settings and requires no user interaction beyond normal chat usage. The custom markdown-it image renderer in frontend/src/utils/chat/markdown.js interpolates token.content directly into the alt attribute without HTML entity escaping. The PromptReply component renders this output via dangerouslySetInnerHTML without DOMPurify sanitization — unlike HistoricalMessage which correctly applies DOMPurify.sanitize().
References
| Link | Resource |
|---|---|
| https://github.com/Mintplex-Labs/anything-llm/commit/9e2d144dc8be6fab29f560f5bcdaa9ef7dbb4214 | Patch |
| https://github.com/Mintplex-Labs/anything-llm/security/advisories/GHSA-rrmw-2j6x-4mf2 | Exploit Vendor Advisory |
Configurations
History
16 Mar 2026, 20:34
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Mintplexlabs
Mintplexlabs anythingllm |
|
| References | () https://github.com/Mintplex-Labs/anything-llm/commit/9e2d144dc8be6fab29f560f5bcdaa9ef7dbb4214 - Patch | |
| References | () https://github.com/Mintplex-Labs/anything-llm/security/advisories/GHSA-rrmw-2j6x-4mf2 - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:* |
16 Mar 2026, 14:19
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-16 14:19
Updated : 2026-03-16 20:34
NVD link : CVE-2026-32626
Mitre link : CVE-2026-32626
CVE.ORG link : CVE-2026-32626
JSON object : View
Products Affected
mintplexlabs
- anythingllm
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
