The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-32719

CVE-2026-32719: Mintplexlabs AnythingLLM Path Traversal

CVE-2026-32719 is a path traversal flaw in Mintplexlabs AnythingLLM that enables Zip Slip attacks leading to arbitrary code execution. This article covers the technical details, affected versions, impact, and mitigation.

Published: March 20, 2026

CVE-2026-32719 Overview

CVE-2026-32719 is a Path Traversal vulnerability affecting AnythingLLM, an application that transforms pieces of content into context that any LLM can use as references during chatting. In versions 1.11.1 and earlier, the ImportedPlugin.importCommunityItemFromUrl() function in server/utils/agents/imported.js downloads a ZIP file from a community hub URL and extracts it using AdmZip.extractAllTo() without validating file paths within the archive. This enables a Zip Slip path traversal attack that can lead to arbitrary code execution.

Critical Impact

This vulnerability allows attackers to write arbitrary files outside the intended directory through specially crafted ZIP archives, potentially leading to remote code execution on the target system.

Affected Products

  • Mintplexlabs AnythingLLM version 1.11.1 and earlier

Discovery Timeline

  • 2026-03-16 - CVE CVE-2026-32719 published to NVD
  • 2026-03-16 - Last updated in NVD database

Technical Details for CVE-2026-32719

Vulnerability Analysis

The vulnerability resides in the community plugin import functionality of AnythingLLM. When users import plugins from community hub URLs, the application downloads a ZIP archive and extracts its contents using the AdmZip library's extractAllTo() method. The fundamental flaw is the absence of path validation for entries within the ZIP archive before extraction.

This weakness (CWE-22: Improper Limitation of a Pathname to a Restricted Directory) allows malicious actors to craft ZIP archives containing entries with directory traversal sequences such as ../ in their filenames. When extracted, these entries can write files to arbitrary locations on the filesystem outside the designated plugin folder.

The exploitation requires network access with high-privileged user interaction, but successful exploitation grants attackers the ability to overwrite critical application files or plant malicious scripts in executable locations.

Root Cause

The root cause is the direct use of AdmZip.extractAllTo() without first iterating through archive entries and validating that resolved extraction paths remain within the intended plugin folder. The original code trusted the ZIP archive contents implicitly, assuming all entry names would resolve to safe paths within the target directory.

Attack Vector

An attacker with the ability to influence community hub content or conduct a man-in-the-middle attack could serve a malicious ZIP archive containing specially crafted entry names. When a privileged user imports this plugin, the archive entries with path traversal sequences (e.g., ../../config/malicious.js) would be extracted outside the plugin folder, potentially overwriting application configuration files or placing executable code in sensitive directories.

The attack requires:

  1. Network access to serve or intercept plugin downloads
  2. A privileged user to initiate the plugin import
  3. User interaction to trigger the vulnerable code path
javascript
       // Note: https://github.com/cthackers/adm-zip?tab=readme-ov-file#electron-original-fs
       const AdmZip = require("adm-zip");
       const zip = new AdmZip(zipFilePath);

+      // Validate all zip entries to prevent Zip Slip path traversal attacks (CWE-22)
+      for (const entry of zip.getEntries()) {
+        const entryPath = path.resolve(pluginFolder, entry.entryName);
+        if (!isWithin(pluginFolder, entryPath) && pluginFolder !== entryPath) {
+          throw new Error(
+            `[ImportedPlugin.importCommunityItemFromUrl]: Entry "${entry.entryName}" would extract outside plugin folder - not allowed.`
+          );
+        }
+      }
+
       zip.extractAllTo(pluginFolder);

       // We want to make sure specific keys are set to the proper values for

Source: GitHub Commit Update

Detection Methods for CVE-2026-32719

Indicators of Compromise

  • Unexpected files appearing outside the AnythingLLM plugin directories
  • Modified application configuration files or scripts without authorized changes
  • Newly created files in system directories following plugin import operations
  • Log entries showing plugin imports from untrusted or unexpected sources

Detection Strategies

  • Monitor filesystem activity during plugin import operations for writes outside the designated plugin folder
  • Implement file integrity monitoring on critical AnythingLLM application directories
  • Review web server logs for unusual community hub URL patterns or external plugin sources
  • Configure application-level logging to capture all plugin import operations with source URLs

Monitoring Recommendations

  • Enable detailed logging for the ImportedPlugin.importCommunityItemFromUrl() function
  • Set up alerts for file creation events in parent directories of the plugin folder
  • Monitor network traffic for ZIP downloads from untrusted community hub sources
  • Implement SentinelOne Singularity platform monitoring to detect unauthorized file system modifications

How to Mitigate CVE-2026-32719

Immediate Actions Required

  • Upgrade AnythingLLM to a version containing the security patch (commit 6a492f038da195a5c9a239d5ca2e9f2151c25f8c or later)
  • Audit recently imported community plugins for suspicious file paths or unexpected content
  • Review the filesystem for any files that may have been written outside plugin directories
  • Temporarily disable community plugin imports if immediate patching is not possible

Patch Information

The Mintplex Labs team has addressed this vulnerability by implementing path validation before ZIP extraction. The fix iterates through all ZIP entries and uses the isWithin() function to verify that each resolved entry path remains within the designated plugin folder. If any entry would extract outside the allowed directory, the operation is aborted with an error.

The patch is available in commit 6a492f038da195a5c9a239d5ca2e9f2151c25f8c. Refer to the GitHub Security Advisory for additional details.

Workarounds

  • Disable community plugin import functionality until the patch can be applied
  • Restrict network access to trusted community hub sources only
  • Run AnythingLLM with restricted filesystem permissions to limit potential impact
  • Implement network-level controls to prevent access to untrusted plugin sources
bash
# Configuration example - Restrict AnythingLLM filesystem permissions
# Run as a dedicated user with limited directory access
useradd -r -s /sbin/nologin anythingllm
chown -R anythingllm:anythingllm /opt/anythingllm
chmod -R 750 /opt/anythingllm
# Ensure the plugins directory has strict permissions
chmod 700 /opt/anythingllm/plugins

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePath Traversal

  • Vendor/TechMintplexlabs Anythingllm

  • SeverityMEDIUM

  • CVSS Score6.4

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-22
  • Vendor Resources
  • GitHub Commit Update

  • GitHub Security Advisory
  • Related CVEs
  • CVE-2024-3025: Mintplexlabs AnythingLLM Path Traversal

  • CVE-2026-32617: Mintplexlabs AnythingLLM Auth Bypass Flaw

  • CVE-2026-32626: Mintplexlabs AnythingLLM RCE Vulnerability

  • CVE-2026-32628: Mintplexlabs AnythingLLM SQLi Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English