Home

Description

AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. If AnythingLLM prior to version 1.10.0 is configured to use Qdrant as the vector database with an API key, this QdrantApiKey could be exposed in plain text to unauthenticated users via the `/api/setup-complete` endpoint. Leakage of QdrantApiKey allows an unauthenticated attacker full read/write access to the Qdrant vector database instance used by AnythingLLM. Since Qdrant often stores the core knowledge base for RAG in AnythingLLM, this can lead to complete compromise of the semantic search / retrieval functionality and indirect leakage of confidential uploaded documents. Version 1.10.0 patches the issue.

PUBLISHED Reserved 2026-01-23 | Published 2026-01-26 | Updated 2026-01-26 | Assigner GitHub_M




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-201: Insertion of Sensitive Information Into Sent Data

Product status

< 1.10.0
affected

References

github.com/...ng-llm/security/advisories/GHSA-gm94-qc2p-xcwf

cve.org (CVE-2026-24477)

nvd.nist.gov (CVE-2026-24477)

Download JSON