Vulnerability Details CVE-2026-41318
AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. Prior to version 1.12.1, AnythingLLM's in-chat markdown renderer has an unsafe custom rule for images that interpolates the markdown image's `alt` text into an HTML `alt="..."` attribute without any HTML encoding. Every call-site in the app wraps `renderMarkdown(...)` with `DOMPurify.sanitize(...)` as defense-in-depth — except the `Chartable` component, which renders chart captions with no sanitization. The chart caption is the natural-language text the LLM emits around a `create-chart` tool call, so any attacker who can influence the LLM's output — most cheaply via indirect prompt injection in a shared workspace document, or directly if they can create a chart record in a multi-user workspace — can trigger stored DOM-level XSS in every other user's browser when they open that conversation. AnythingLLM chat history is loaded server-side via `GET /api/workspace/:slug/chats` and rendered directly into the chat UI. Version 1.12.1 contains a patch for this issue.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 9.2%
CVSS Severity
CVSS v3 Score 5.4
Products affected by CVE-2026-41318
-
cpe:2.3:a:mintplexlabs:anythingllm:-
-
cpe:2.3:a:mintplexlabs:anythingllm:0.0.1
-
cpe:2.3:a:mintplexlabs:anythingllm:0.1.0
-
cpe:2.3:a:mintplexlabs:anythingllm:1.0.0
-
cpe:2.3:a:mintplexlabs:anythingllm:1.1.0
-
cpe:2.3:a:mintplexlabs:anythingllm:1.1.1
-
cpe:2.3:a:mintplexlabs:anythingllm:1.10.0
-
cpe:2.3:a:mintplexlabs:anythingllm:1.11.1
-
cpe:2.3:a:mintplexlabs:anythingllm:1.11.2
-
cpe:2.3:a:mintplexlabs:anythingllm:1.12.0
-
cpe:2.3:a:mintplexlabs:anythingllm:1.2.0
-
cpe:2.3:a:mintplexlabs:anythingllm:1.2.1
-
cpe:2.3:a:mintplexlabs:anythingllm:1.2.2
-
cpe:2.3:a:mintplexlabs:anythingllm:1.2.3
-
cpe:2.3:a:mintplexlabs:anythingllm:1.2.4
-
cpe:2.3:a:mintplexlabs:anythingllm:1.3.0
-
cpe:2.3:a:mintplexlabs:anythingllm:1.3.1
-
cpe:2.3:a:mintplexlabs:anythingllm:1.4.0
-
cpe:2.3:a:mintplexlabs:anythingllm:1.5.3
-
cpe:2.3:a:mintplexlabs:anythingllm:1.5.4
-
cpe:2.3:a:mintplexlabs:anythingllm:1.5.5
-
cpe:2.3:a:mintplexlabs:anythingllm:1.6.1
-
cpe:2.3:a:mintplexlabs:anythingllm:1.6.10
-
cpe:2.3:a:mintplexlabs:anythingllm:1.6.11
-
cpe:2.3:a:mintplexlabs:anythingllm:1.6.2
-
cpe:2.3:a:mintplexlabs:anythingllm:1.6.3
-
cpe:2.3:a:mintplexlabs:anythingllm:1.6.4
-
cpe:2.3:a:mintplexlabs:anythingllm:1.6.5
-
cpe:2.3:a:mintplexlabs:anythingllm:1.6.6
-
cpe:2.3:a:mintplexlabs:anythingllm:1.6.7
-
cpe:2.3:a:mintplexlabs:anythingllm:1.6.8
-
cpe:2.3:a:mintplexlabs:anythingllm:1.6.9
-
cpe:2.3:a:mintplexlabs:anythingllm:1.7.0
-
cpe:2.3:a:mintplexlabs:anythingllm:1.7.1
-
cpe:2.3:a:mintplexlabs:anythingllm:1.7.2
-
cpe:2.3:a:mintplexlabs:anythingllm:1.7.3
-
cpe:2.3:a:mintplexlabs:anythingllm:1.7.4
-
cpe:2.3:a:mintplexlabs:anythingllm:1.7.5
-
cpe:2.3:a:mintplexlabs:anythingllm:1.7.6
-
cpe:2.3:a:mintplexlabs:anythingllm:1.7.7
-
cpe:2.3:a:mintplexlabs:anythingllm:1.7.8
-
cpe:2.3:a:mintplexlabs:anythingllm:1.8.0
-
cpe:2.3:a:mintplexlabs:anythingllm:1.8.1
-
cpe:2.3:a:mintplexlabs:anythingllm:1.8.2
-
cpe:2.3:a:mintplexlabs:anythingllm:1.8.3
-
cpe:2.3:a:mintplexlabs:anythingllm:1.8.4
-
cpe:2.3:a:mintplexlabs:anythingllm:1.8.5
-
cpe:2.3:a:mintplexlabs:anythingllm:1.9.0
-
cpe:2.3:a:mintplexlabs:anythingllm:1.9.1