CVE-2026-31863: Authentication Bypass via Brute Force in Anytype Heart gRPC API
Vulnerability ID: CVE-2026-31863
CVSS Score: 3.6
Published: 2026-03-11
The Anytype Heart middleware library fails to restrict excessive authentication attempts on its local gRPC client API. This vulnerability allows a local, unprivileged attacker to bypass challenge-based authentication by brute-forcing a 4-digit authorization code, resulting in unauthorized access to the Anytype application backend and the user's local data.
TL;DR
Anytype Heart lacks rate limiting on its 4-digit PIN authentication challenge, allowing a local attacker to brute-force the code and gain unauthorized access to the gRPC API.
Technical Details
- CWE ID: CWE-307
- Attack Vector: Local (AV:L)
- CVSS Base Score: 3.6 (Low)
- Impact: Confidentiality & Integrity Bypass
- Exploit Status: Unexploited publicly
- Authentication Factor: 4-Digit PIN Challenge
- CISA KEV: Not Listed
Affected Systems
- Anytype Heart gRPC local API
- Anytype CLI local management interface
- Anytype Desktop local daemon
-
anytype-heart: < 0.48.4 (Fixed in:
0.48.4) -
anytype-cli: < 0.1.11 (Fixed in:
0.1.11) -
anytype-ts: < 0.54.5 (Fixed in:
0.54.5)
Mitigation Strategies
- Update Anytype Heart middleware to version 0.48.4 or later.
- Update Anytype CLI tools to version 0.1.11 or later.
- Update the Anytype Desktop client to version 0.54.5 or later.
- Enforce strict OS-level process isolation to prevent unauthorized local processes from interacting with loopback interfaces.
- Implement endpoint monitoring to detect anomalous bursts of local network traffic targeting gRPC ports.
Remediation Steps:
- Identify all deployed instances of Anytype Desktop, CLI, and standalone Heart middleware.
- Download the patched binaries for version 0.54.5 (Desktop), 0.1.11 (CLI), and 0.48.4 (Heart).
- Terminate all running Anytype processes on the target machine.
- Apply the updates using the system's package manager or manual binary replacement.
- Restart the Anytype application and verify that normal local authentication functionality is intact.
References
- CVE Record: CVE-2026-31863
- GitHub Security Advisory: GHSA-vv3h-7qwr-722v
- Anytype Heart Repository
- Anytype CLI Repository
- Anytype Desktop Repository
Read the full report for CVE-2026-31863 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)