CVE-2025-43862

Dify is an open-source LLM app development platform. Prior to version 0.6.12, a normal user is able to access and modify APP orchestration, even though the web UI of APP orchestration is not presented for a normal user. This access control flaw allows non-admin users to make unauthorized access and changes on the APPSs. This issue has been patched in version 0.6.12. A workaround for this vulnerability involves updating the the access control mechanisms to enforce stricter user role permissions and implementing role-based access controls (RBAC) to ensure that only users with admin privileges can access Orchestration of the APPs.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:langgenius:dify:*:*:*:*:*:node.js:*:*

History

01 Aug 2025, 22:00

Type Values Removed Values Added
CPE cpe:2.3:a:langgenius:dify:*:*:*:*:*:node.js:*:*
References () https://github.com/langgenius/dify/pull/5266 - () https://github.com/langgenius/dify/pull/5266 - Issue Tracking, Patch
References () https://github.com/langgenius/dify/security/advisories/GHSA-6pw4-jqhv-3626 - () https://github.com/langgenius/dify/security/advisories/GHSA-6pw4-jqhv-3626 - Exploit, Vendor Advisory
First Time Langgenius dify
Langgenius

25 Apr 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-25 15:15

Updated : 2025-08-01 22:00


NVD link : CVE-2025-43862

Mitre link : CVE-2025-43862


JSON object : View

Products Affected

langgenius

  • dify
CWE
CWE-862

Missing Authorization

CWE-284

Improper Access Control