Langgenius

Dify

26 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.04%
  • Veröffentlicht 05.01.2026 21:41:01
  • Zuletzt bearbeitet 12.01.2026 18:20:15

Dify is an open-source LLM app development platform. Prior to version 1.11.0, the API key is exposed in plaintext to the frontend, allowing non-administrator users to view and reuse it. This can lead to unauthorized access to third-party services, po...

  • EPSS 16.71%
  • Veröffentlicht 18.12.2025 00:00:00
  • Zuletzt bearbeitet 22.01.2026 20:16:09

Dify v1.9.1 is vulnerable to Insecure Permissions. An unauthenticated attacker can directly send HTTP GET requests to the /console/api/system-features endpoint without any authentication credentials or session tokens. The endpoint fails to implement ...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 18.12.2025 00:00:00
  • Zuletzt bearbeitet 29.01.2026 18:16:07

Default credentials in Dify thru 1.5.1. PostgreSQL username and password specified in the docker-compose.yaml file included in its source code. NOTE: the Supplier reports that the Docker configuration does not make PostgreSQL (on TCP port 5432) expos...

  • EPSS 0.02%
  • Veröffentlicht 18.12.2025 00:00:00
  • Zuletzt bearbeitet 22.01.2026 18:16:42

A Cross-Origin Resource Sharing (CORS) misconfiguration vulnerability exists in Dify v1.9.1 in the /console/api/setup endpoint. The endpoint implements an insecure CORS policy that reflects any Origin header and enables Access-Control-Allow-Credentia...

  • EPSS 0.02%
  • Veröffentlicht 18.12.2025 00:00:00
  • Zuletzt bearbeitet 28.01.2026 17:16:07

A Cross-Origin Resource Sharing (CORS) misconfiguration vulnerability exists in Dify v1.9.1 in the /console/api/system-features endpoint. The endpoint implements an overly permissive CORS policy that reflects arbitrary Origin headers and sets Access-...

Exploit
  • EPSS 0.49%
  • Veröffentlicht 22.10.2025 13:13:32
  • Zuletzt bearbeitet 30.10.2025 17:46:46

In langgenius/dify-web version 1.6.0, the authentication mechanism reveals the existence of user accounts by returning different error messages for non-existent and existing accounts. Specifically, when a login or registration attempt is made with a ...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 17.10.2025 15:48:04
  • Zuletzt bearbeitet 29.10.2025 19:16:27

Dify is an LLM application development platform. In Dify versions through 1.9.1, the MCP OAuth component is vulnerable to cross-site scripting when a victim connects to an attacker-controlled remote MCP server. The vulnerability exists in the OAuth f...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 25.09.2025 14:15:45
  • Zuletzt bearbeitet 14.10.2025 14:10:41

Dify is an open-source LLM app development platform. In version 1.8.1, a broken access control vulnerability on the /console/api/apps/<APP_ID>chat-messages?conversation_id=<CONVERSATION_ID>&limit=10 endpoint allows users in the same workspace to read...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 07.07.2025 09:56:19
  • Zuletzt bearbeitet 10.07.2025 13:34:32

An XSS vulnerability exists in langgenius/dify versions prior to 1.1.3, specifically affecting Firefox browsers. This vulnerability allows an attacker to obtain the administrator's token by sending a payload in the published chat. When the administra...

Exploit
  • EPSS 0.17%
  • Veröffentlicht 07.07.2025 09:55:28
  • Zuletzt bearbeitet 10.07.2025 15:01:31

langgenius/dify versions 1.1.0 to 1.1.2 are vulnerable to unsanitized input in the code node, allowing execution of arbitrary code with full root permissions. The vulnerability arises from the ability to override global functions in JavaScript, such ...