Generated remediation guidance and an executive summary. No account required.
mintplex-labs/anything-llm is vulnerable to improper input validation, allowing attackers to read and delete arbitrary files on the server. By manipulating the 'logo_filename' parameter in the 'system-preferences' API endpoint, an attacker can construct requests to read sensitive files or the application's '.env' file, and even delete files by setting the 'logo_filename' to the path of the target file and invoking the 'remove-logo' API endpoint. This vulnerability is due to the lack of proper sanitization of user-supplied input.
Cite this page
CVE-2024-3028. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2024-3028
Use CWE-20, Mintplexlabs vendor hub and Anythingllm product page to widen CVE-2024-3028 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-32626, CVE-2026-24477 and CVE-2026-32628 for nearby disclosures in the same product family.