Taking longer than expected.
Reload the pageTaking longer than expected.
Reload the pageAreebi commits to public CVE disclosure for security issues in products we develop or maintain. We have no CVEs assigned against Areebi-developed products as of 2026-05-20, because we have not yet shipped a paid product to production.
For our open-source contributions (AnythingLLM upstream), CVEs filed against upstream are linked in the table below as they are issued. This page is the single source of truth for the Areebi CVE log.
Every reported vulnerability moves through this pipeline. The reporter stays in the loop at each step.
We confirm reproduction, agree on severity, and align on the disclosure timeline. The reporter remains the primary contact through the entire process.
Areebi is not yet a CVE Numbering Authority (CNA). We request CVE IDs directly from MITRE via the standard MITRE CVE request form. Typical turnaround is 5 to 14 days.
Default 90 day window from confirmed report to public advisory, negotiable per-report. Active exploitation can shorten the window; complex multi-party fixes can extend it.
We ship a patched release, publish the advisory on this page (and via RSS), file the CVE with MITRE, and credit the researcher unless they prefer anonymity.
Below is the canonical CVE table for Areebi-developed and Areebi-maintained software. Updated within 24 hours of any CVE being issued.
| CVE ID | Affected component | Severity | Discovered | Disclosed | Patched | Reporter | Advisory link |
|---|---|---|---|---|---|---|---|
No CVEs disclosed yet We have not shipped a paid product to production. When the first CVE is filed against Areebi software, it will appear in this table within 24 hours of MITRE assignment. | |||||||
Severity ratings use CVSS 3.1 base scores. Reporter names are published with consent; anonymous reports are credited as "anonymous researcher".
No marketing list, no waiting for our weekly digest. Pick the channel that fits your workflow.
The Areebi blog feed includes every published security advisory. Add it to your reader for real-time delivery.
Subscribe to /feed.xmlAdvisories for our AnythingLLM fork are published as GitHub Security Advisories on the mitsubishyy/anything-llm repository.
Watch advisories on GitHubTo report a vulnerability or request to be added to a coordinated disclosure list for a specific issue, email us directly.
security@areebi.comUpstream AnythingLLM CVEs that we did not introduce are tracked via the upstream repository and Mintplex Labs advisories. We will link them from our advisory text when they affect Areebi customer deployments.
Coordinated disclosure, public threat models, and a self-attested SOC 2 readiness tracker reinforce each other.