top of page
perceptive_background_267k.jpg

AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. In 1.11.1 and earlier, AnythingLLM D…

Published:

15 maart 2026 om 23:00:00

Alert date:

16 maart 2026 om 21:03:40

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Emerging Technologies

AnythingLLM Desktop versions 1.11.1 and earlier contain a critical XSS vulnerability in the chat rendering pipeline that escalates to Remote Code Execution. The vulnerability occurs in the custom markdown-it image renderer which interpolates token.content directly into HTML alt attributes without proper escaping. The PromptReply component renders this output via dangerouslySetInnerHTML without DOMPurify sanitization, unlike the secure HistoricalMessage component. This works with default settings and requires no user interaction beyond normal chat usage, making it particularly dangerous. The insecure Electron configuration allows the XSS to escalate to full RCE on the host operating system.

Technical details

Mitigation steps:

Affected products:

AnythingLLM Desktop

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page