In langgenius/dify v0.10.1, the `/forgot-password/resets` endpoint does not verify the password reset code, allowing an attacker to reset the password of any user, including administrators. This vulnerability can lead to a complete compromise of the application.
References
Link | Resource |
---|---|
https://huntr.com/bounties/00a8b403-7da5-431e-afa3-40339cf734bf | Exploit Third Party Advisory |
Configurations
History
14 Jul 2025, 18:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://huntr.com/bounties/00a8b403-7da5-431e-afa3-40339cf734bf - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:langgenius:dify:0.10.1:*:*:*:*:node.js:*:* | |
First Time |
Langgenius dify
Langgenius |
|
Summary |
|
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-14 18:18
NVD link : CVE-2024-12776
Mitre link : CVE-2024-12776
CVE.ORG link : CVE-2024-12776
JSON object : View
Products Affected
langgenius
- dify
CWE
CWE-305
Authentication Bypass by Primary Weakness