CVE-2025-49149

Dify is an open-source LLM app development platform. In version 1.2.0, there is insufficient filtering of user input by web applications. Attackers can use website vulnerabilities to inject malicious script code into web pages. This may result in a cross-site scripting (XSS) attack when a user browses these web pages. At time of posting, there is no known patched version.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:langgenius:dify:1.2.0:*:*:*:*:node.js:*:*

History

01 Aug 2025, 22:13

Type Values Removed Values Added
CPE cpe:2.3:a:langgenius:dify:1.2.0:*:*:*:*:node.js:*:*
First Time Langgenius dify
Langgenius
References () https://github.com/langgenius/dify/security/advisories/GHSA-grmh-ww4v-5cgj - () https://github.com/langgenius/dify/security/advisories/GHSA-grmh-ww4v-5cgj - Exploit, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1

18 Jun 2025, 13:46

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-17 23:15

Updated : 2025-08-01 22:13


NVD link : CVE-2025-49149

Mitre link : CVE-2025-49149

CVE.ORG link : CVE-2025-49149


JSON object : View

Products Affected

langgenius

  • dify
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')