CVE-2026-32626
AnythingLLM · AnythingLLM Desktop
A Streaming Phase XSS in AnythingLLM Desktop's chat pipeline escalates to Remote Code Execution (RCE) on the host OS due to insecure Electron configurations and lack of sanitization.
Executive summary
AnythingLLM Desktop is subject to a critical vulnerability where a simple chat interaction can trigger remote code execution on the user's computer without any interaction.
Vulnerability
The vulnerability stems from a failure to escape HTML entities in the custom markdown-it image renderer and the use of dangerouslySetInnerHTML without DOMPurify sanitization. This unauthenticated XSS flaw escalates to RCE because the underlying Electron framework is insecurely configured.
Business impact
This vulnerability poses a catastrophic risk to individual workstations and corporate data. An attacker can execute arbitrary commands on the host operating system simply by sending a malicious payload through the chat interface. The CVSS score of 9.6 reflects the ease of exploitation and the total compromise of the host machine.
Remediation
Immediate Action: Update AnythingLLM Desktop to the latest version (post-1.11.1) immediately to apply the necessary sanitization and Electron security hardening.
Proactive Monitoring: Review endpoint security logs for suspicious process spawning from the AnythingLLM application and inspect chat history for unusual markdown or HTML tags.
Compensating Controls: Use application control software to restrict the execution of unauthorized scripts and ensure the application is run with the least privilege necessary.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Immediate remediation is mandatory for all users of AnythingLLM Desktop. The transition from XSS to RCE is a critical failure point; therefore, updating to a version that implements proper DOMPurify sanitization and hardened Electron settings is the only effective way to mitigate this risk.