Home

Description

AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. In 1.11.1 and earlier, a SQL injection vulnerability in the built-in SQL Agent plugin allows any user who can invoke the agent to execute arbitrary SQL commands on connected databases. The getTableSchemaSql() method in all three database connectors (MySQL, PostgreSQL, MSSQL) constructs SQL queries using direct string concatenation of the table_name parameter without sanitization or parameterization.

PUBLISHED Reserved 2026-03-12 | Published 2026-03-13 | Updated 2026-03-13 | Assigner GitHub_M




HIGH: 7.7CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

<= 1.11.1
affected

References

github.com/...ng-llm/security/advisories/GHSA-jwjx-mw2p-5wc7

github.com/...ommit/334ce052f063b53a4275518cbed3bab357695d7e

cve.org (CVE-2026-32628)

nvd.nist.gov (CVE-2026-32628)

Download JSON