8.1
CVE-2024-12776
- EPSS 0.13%
- Veröffentlicht 20.03.2025 10:10:42
- Zuletzt bearbeitet 14.07.2025 18:18:36
- Quelle security@huntr.dev
- CVE-Watchlists
- Unerledigt
In langgenius/dify v0.10.1, the `/forgot-password/resets` endpoint does not verify the password reset code, allowing an attacker to reset the password of any user, including administrators. This vulnerability can lead to a complete compromise of the application.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Langgenius ≫ Dify Version0.10.1 SwPlatformnode.js
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.13% | 0.335 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@huntr.dev | 8.1 | 2.2 | 5.9 |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-305 Authentication Bypass by Primary Weakness
The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.