Langgenius

Dify

19 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.04%
  • Published 20.03.2025 10:11:38
  • Last modified 15.07.2025 15:41:34

A Server-Side Request Forgery (SSRF) vulnerability was identified in langgenius/dify version 0.10.2. The vulnerability occurs in the 'Create Knowledge' section when uploading DOCX files. If an external relationship exists in the DOCX file, the reltyp...

Exploit
  • EPSS 0.03%
  • Published 20.03.2025 10:10:55
  • Last modified 15.07.2025 16:00:30

A stored cross-site scripting (XSS) vulnerability exists in the latest version of langgenius/dify. The vulnerability is due to improper validation and sanitization of user input in SVG markdown support within the chatbot feature. An attacker can expl...

Exploit
  • EPSS 0.07%
  • Published 20.03.2025 10:10:42
  • Last modified 14.07.2025 18:18:36

In langgenius/dify v0.10.1, the `/forgot-password/resets` endpoint does not verify the password reset code, allowing an attacker to reset the password of any user, including administrators. This vulnerability can lead to a complete compromise of the ...

Exploit
  • EPSS 0.07%
  • Published 20.03.2025 10:10:41
  • Last modified 11.07.2025 20:34:47

A vulnerability in langgenius/dify versions <=v0.9.1 allows for code injection via internal SSRF requests in the Dify sandbox service. This vulnerability enables an attacker to execute arbitrary Python code with root privileges within the sandbox env...

Exploit
  • EPSS 0.13%
  • Published 20.03.2025 10:09:33
  • Last modified 15.07.2025 15:59:02

langgenius/dify version v0.10.1 contains a vulnerability where there are no limits applied to the number of code guess attempts for password reset. This allows an unauthenticated attacker to reset owner, admin, or other user passwords within a few ho...

Exploit
  • EPSS 0.04%
  • Published 20.03.2025 10:09:23
  • Last modified 14.07.2025 18:13:49

langgenius/dify version 0.10.1 contains a Server-Side Request Forgery (SSRF) vulnerability in the test functionality for the Create Custom Tool option via the REST API `POST /console/api/workspaces/current/tool-provider/api/test/pre`. Attackers can s...

Exploit
  • EPSS 0.04%
  • Published 20.03.2025 10:09:08
  • Last modified 14.07.2025 17:42:04

A stored cross-site scripting (XSS) vulnerability exists in langgenius/dify version latest, specifically in the chat log functionality. The vulnerability arises because certain HTML tags like <input> and <form> are not disallowed, allowing an attacke...

Exploit
  • EPSS 0.04%
  • Published 20.03.2025 10:08:59
  • Last modified 14.07.2025 17:25:30

A privilege escalation vulnerability exists in langgenius/dify version 0.9.1. This vulnerability allows a normal user to modify Orchestrate instructions for a chatbot created by an admin user. The issue arises because the application does not properl...

Exploit
  • EPSS 0.06%
  • Published 20.03.2025 10:08:46
  • Last modified 16.07.2025 15:15:54

A vulnerability in langgenius/dify v0.10.1 allows an attacker to take over any account, including administrator accounts, by exploiting a weak pseudo-random number generator (PRNG) used for generating password reset codes. The application uses `rando...