Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the `!==` used for comparison.
The risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute
CVE ID: CVE-2024-0436
CVSS Base Severity: HIGH
CVSS Base Score: 7.1
CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
Vendor: mintplex-labs
Product: mintplex-labs/anything-llm
EPSS Score: 0.16% (probability of being exploited)
EPSS Percentile: 37.6% (scored less or equal to compared to others)
EPSS Date: 2025-04-25 (when was this score calculated)
SSVC Exploitation: none
SSVC Technical Impact: partial
SSVC Automatable: false