Langgenius

Dify

35 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.03%
  • Veröffentlicht 05.05.2026 21:16:23
  • Zuletzt bearbeitet 12.05.2026 16:20:10

Dify before version 1.14.0 contains an authorization bypass vulnerability that allows authenticated users to read the full contents of files uploaded by other users within the same tenant by supplying an arbitrary file UUID in the files array of a ch...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 04.05.2026 17:34:36
  • Zuletzt bearbeitet 11.05.2026 21:08:32

Dify is an open-source LLM app development platform. Prior to version 1.13.1, using the method POST /api/files/upload, any unauthenticated user can upload an SVG file with XSS. The method POST /v1/files/upload, which requires authentication through t...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 20.04.2026 23:16:24
  • Zuletzt bearbeitet 23.04.2026 15:12:29

Dify is an open-source LLM app development platform. Prior to 1.13.1, the method `DELETE /console/api/installed-apps/<appId>/conversations/<conversationId>` has poor authorization checking and allows any Dify-authenticated user to delete someone else...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 20.04.2026 08:00:17
  • Zuletzt bearbeitet 29.04.2026 01:00:01

A vulnerability has been found in langgenius dify up to 1.13.3. Impacted is the function openInNewTab of the file web/app/components/base/image-uploader/image-preview.tsx of the component ImagePreview. The manipulation of the argument filename leads ...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 20.04.2026 07:45:16
  • Zuletzt bearbeitet 29.04.2026 01:00:01

A flaw has been found in langgenius dify up to 1.13.3. This issue affects the function parse_openai_plugin_json_to_tool_bundle of the file api/core/tools/utils/parser.py of the component ApiBasedToolSchemaParser. Executing a manipulation of the argum...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 20.04.2026 07:30:12
  • Zuletzt bearbeitet 29.04.2026 01:00:01

A vulnerability was detected in langgenius dify up to 0.6.9. This vulnerability affects the function get_api_tool_provider_remote_schema of the file api/services/tools/api_tools_manage_service.py of the component ApiToolManageService. Performing a ma...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 03.03.2026 21:42:25
  • Zuletzt bearbeitet 05.03.2026 21:24:07

Dify is an open-source LLM app development platform. Prior to 1.11.2, Dify is vulnerable to a stored XSS issue when rendering Mermaid diagrams within chats. This occurs because Dify’s default Mermaid configuration uses securityLevel: loose, which all...

Exploit
  • EPSS 0.45%
  • Veröffentlicht 27.02.2026 20:25:24
  • Zuletzt bearbeitet 09.03.2026 20:23:10

Dify is an open-source LLM app development platform. Prior to 1.9.0, responses from the Dify API to existing and non-existent accounts differ, allowing an attacker to enumerate email addresses registered with Dify. Version 1.9.0 fixes the issue.

Exploit
  • EPSS 0.05%
  • Veröffentlicht 11.02.2026 21:23:09
  • Zuletzt bearbeitet 13.02.2026 15:04:10

Dify is an open-source LLM app development platform. Prior to 1.13.0, a cross site scripting vulnerability has been found in the web application chat frontend when using echarts. User or llm inputs containing echarts containing a specific javascript ...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 05.01.2026 21:41:01
  • Zuletzt bearbeitet 12.01.2026 18:20:15

Dify is an open-source LLM app development platform. Prior to version 1.11.0, the API key is exposed in plaintext to the frontend, allowing non-administrator users to view and reuse it. This can lead to unauthorized access to third-party services, po...