CVE-2024-22422
Homebrew vulnerability analysis and mitigation

Overview

AnythingLLM, an application that transforms documents and resources into LLM-compatible context, was found to contain a critical vulnerability (CVE-2024-22422) in versions prior to commit 08d33cfd8. The vulnerability was discovered in an unauthenticated API route (file export) that could allow attackers to crash the server, resulting in a denial of service attack (GitHub Advisory, NVD).

Technical details

The vulnerability exists in the 'data-export' endpoint which processes file exports using a filename parameter as user input. The endpoint's workflow includes input filtering for directory traversal attacks, file fetching, and subsequent deletion. However, attackers can bypass the input filter mechanism to target the current directory. Due to the lack of error-handling wrapper around the deletion process, attempting to delete the directory causes the server to crash. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (GitHub Advisory).

Impact

The vulnerability enables unauthenticated attackers to perform denial of service attacks against AnythingLLM instances. The attack can be executed using a single HTTP packet, causing the server to crash. Organizations requiring high system availability could suffer significant financial loss and reputation damage from this attack (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been addressed in commit 08d33cfd8. Users are advised to upgrade to versions containing this fix. There are no known workarounds for this vulnerability. The recommended mitigation includes implementing input validation to filter special cases pointing to directories and wrapping the file deletion action in proper error handling (GitHub Advisory, NVD).

Additional resources


SourceThis report was generated using AI

Related Homebrew vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-21693HIGH8.8
  • HomebrewHomebrew
  • iccdev
NoYesJan 07, 2026
CVE-2026-21692HIGH8.8
  • HomebrewHomebrew
  • iccdev
NoYesJan 07, 2026
CVE-2025-69262HIGH7.8
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2026-21885MEDIUM6.5
  • NixOSNixOS
  • miniflux
NoYesJan 08, 2026
CVE-2026-21691MEDIUM6.5
  • HomebrewHomebrew
  • iccdev
NoYesJan 07, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management