Langgenius

Dify

29 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.03%
  • Veröffentlicht 03.03.2026 21:42:25
  • Zuletzt bearbeitet 05.03.2026 21:24:07

Dify is an open-source LLM app development platform. Prior to 1.11.2, Dify is vulnerable to a stored XSS issue when rendering Mermaid diagrams within chats. This occurs because Dify’s default Mermaid configuration uses securityLevel: loose, which all...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 27.02.2026 20:25:24
  • Zuletzt bearbeitet 09.03.2026 20:23:10

Dify is an open-source LLM app development platform. Prior to 1.9.0, responses from the Dify API to existing and non-existent accounts differ, allowing an attacker to enumerate email addresses registered with Dify. Version 1.9.0 fixes the issue.

Exploit
  • EPSS 0.03%
  • Veröffentlicht 11.02.2026 21:23:09
  • Zuletzt bearbeitet 13.02.2026 15:04:10

Dify is an open-source LLM app development platform. Prior to 1.13.0, a cross site scripting vulnerability has been found in the web application chat frontend when using echarts. User or llm inputs containing echarts containing a specific javascript ...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 05.01.2026 21:41:01
  • Zuletzt bearbeitet 12.01.2026 18:20:15

Dify is an open-source LLM app development platform. Prior to version 1.11.0, the API key is exposed in plaintext to the frontend, allowing non-administrator users to view and reuse it. This can lead to unauthorized access to third-party services, po...

  • EPSS 12.88%
  • Veröffentlicht 18.12.2025 00:00:00
  • Zuletzt bearbeitet 22.01.2026 20:16:09

Dify v1.9.1 is vulnerable to Insecure Permissions. An unauthenticated attacker can directly send HTTP GET requests to the /console/api/system-features endpoint without any authentication credentials or session tokens. The endpoint fails to implement ...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 18.12.2025 00:00:00
  • Zuletzt bearbeitet 29.01.2026 18:16:07

Default credentials in Dify thru 1.5.1. PostgreSQL username and password specified in the docker-compose.yaml file included in its source code. NOTE: the Supplier reports that the Docker configuration does not make PostgreSQL (on TCP port 5432) expos...

  • EPSS 0.01%
  • Veröffentlicht 18.12.2025 00:00:00
  • Zuletzt bearbeitet 11.02.2026 15:16:16

A Cross-Origin Resource Sharing (CORS) misconfiguration vulnerability exists in Dify v1.9.1 in the /console/api/setup endpoint. The endpoint implements an insecure CORS policy that reflects any Origin header and enables Access-Control-Allow-Credentia...

  • EPSS 0.01%
  • Veröffentlicht 18.12.2025 00:00:00
  • Zuletzt bearbeitet 28.01.2026 17:16:07

A Cross-Origin Resource Sharing (CORS) misconfiguration vulnerability exists in Dify v1.9.1 in the /console/api/system-features endpoint. The endpoint implements an overly permissive CORS policy that reflects arbitrary Origin headers and sets Access-...

Exploit
  • EPSS 0.31%
  • Veröffentlicht 22.10.2025 13:13:32
  • Zuletzt bearbeitet 30.10.2025 17:46:46

In langgenius/dify-web version 1.6.0, the authentication mechanism reveals the existence of user accounts by returning different error messages for non-existent and existing accounts. Specifically, when a login or registration attempt is made with a ...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 17.10.2025 15:48:04
  • Zuletzt bearbeitet 29.10.2025 19:16:27

Dify is an LLM application development platform. In Dify versions through 1.9.1, the MCP OAuth component is vulnerable to cross-site scripting when a victim connects to an attacker-controlled remote MCP server. The vulnerability exists in the OAuth f...