User can send a chat that contains an XSS opportunity that will then run when the chat is sent and on subsequent page loads.
Given the minimum requirement for a user to send a chat is to be given access to a workspace via an admin the risk is low. Additionally, the location in which the XSS renders is only limited to the user who submits the XSS. 
Ultimately, this attack is limited to the user attacking themselves. There is no anonymous chat submission unless the user does not take the minimum steps required to protect their instance.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 25 Feb 2025 23:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Mintplexlabs Mintplexlabs anythingllm | |
| CPEs | cpe:2.3:a:mintplexlabs:anythingllm:-:*:*:*:*:*:*:* | |
| Vendors & Products | Mintplexlabs Mintplexlabs anythingllm | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-02-25T17:04:13.402Z
Updated: 2024-08-11T14:20:19.541Z
Reserved: 2024-01-11T18:06:15.086Z
Link: CVE-2024-0435
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-01T18:04:49.794Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-02-26T16:27:50.087
Modified: 2025-02-25T22:55:58.797
Link: CVE-2024-0435
 Redhat
                        Redhat
                    No data.
 ReportizFlow
ReportizFlow