8.1
CVE-2024-12776
- EPSS 0.07%
- Veröffentlicht 20.03.2025 10:10:42
- Zuletzt bearbeitet 14.07.2025 18:18:36
- Quelle security@huntr.dev
- Teams Watchlist Login
- Unerledigt Login
In langgenius/dify v0.10.1, the `/forgot-password/resets` endpoint does not verify the password reset code, allowing an attacker to reset the password of any user, including administrators. This vulnerability can lead to a complete compromise of the application.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Langgenius ≫ Dify Version0.10.1 SwPlatformnode.js
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.07% | 0.213 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
security@huntr.dev | 8.1 | 2.2 | 5.9 |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-305 Authentication Bypass by Primary Weakness
The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.