The flaw, rated high to critical severity (CVSS 7.2–9.1), impacts versions before 1.3.1 and stems from improper handling of non-ASCII filenames during file uploads.
According to thr report, the vulnerability arises from the multer middleware’s failure to sanitize directory traversal sequences (e.g., ../) in filenames containing non-ASCII characters.
When uploaded files are processed, attackers can manipulate filenames to write malicious files to unintended server locations.
For example, a filename like ../../malicious.sh this could place an executable script in a system directory, leading to remote code execution (RCE).
Attackers can exploit this flaw in four steps:
%c0%ae%c0%ae/evil.php).Detection Methods:
../ patterns.Mitigation Steps:
The vulnerability was patched in February 2025, with security firms like OffSec and Recorded Future emphasizing its criticality due to the rise in AI tool adoption.
Organizations are advised to prioritize updates, as unpatched systems remain vulnerable to RCE attacks targeting AI infrastructure.
This incident underscores the importance of rigorous input validation in file-handling workflows, particularly for AI-driven platforms with elevated access requirements.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates
The post Critical AnythingLLM Vulnerability Enables Remote Code Execution appeared first on Cyber Security News.
Emily Blunt, Cillian Murphy, Millicent Simmonds, and Noah Jupe are officially reprising their roles for…
Whether you’re after a new Apple Watch Ultra or want to add a few new…
Sony's upgraded PlayStation Spectral Super Resolution (PSSR) technology is rolling out to several titles on…
There's no better time to dive into the world of immersive VR gaming. AliExpress is…
Krafton has been ordered to reinstate the former boss of Subnautica 2 studio Unknown Worlds…
Tje GeForce RTX 5080 graphics card will allow you to run all of the latest…
This website uses cookies.