Dify v1.9.1 is vulnerable to Insecure Permissions. An unauthenticated attacker can directly send HTTP GET requests to the /console/api/system-features endpoint without any authentication credentials or session tokens. The endpoint fails to implement proper authorization checks, allowing anonymous access to sensitive system configuration data.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 30 Dec 2025 19:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:langgenius:dify:1.9.1:*:*:*:*:node.js:*:*

Fri, 19 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 19 Dec 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Langgenius
Langgenius dify
Vendors & Products Langgenius
Langgenius dify

Thu, 18 Dec 2025 18:30:00 +0000

Type Values Removed Values Added
Description Dify v1.9.1 is vulnerable to Insecure Permissions. An unauthenticated attacker can directly send HTTP GET requests to the /console/api/system-features endpoint without any authentication credentials or session tokens. The endpoint fails to implement proper authorization checks, allowing anonymous access to sensitive system configuration data.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-12-19T18:01:50.697Z

Reserved: 2025-10-27T00:00:00.000Z

Link: CVE-2025-63387

cve-icon Vulnrichment

Updated: 2025-12-19T17:32:05.270Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-18T19:16:33.157

Modified: 2025-12-30T19:39:12.797

Link: CVE-2025-63387

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-19T09:18:04Z

Weaknesses