Dify is an open-source LLM app development platform. In version 1.8.1, a broken access control vulnerability on the /console/api/apps/<APP_ID>chat-messages?conversation_id=<CONVERSATION_ID>&limit=10 endpoint allows users in the same workspace to read chat messages of other users. A regular user is able to read the query data and the filename of the admins and probably other users chats, if they know the conversation_id. This impacts the confidentiality of chats. This issue has been patched in version 1.9.0.
References
Link | Resource |
---|---|
https://github.com/langgenius/dify/commit/b2d8a7eaf1693841411934e2056042845ab4f354 | Patch |
https://github.com/langgenius/dify/security/advisories/GHSA-jg5j-c9pq-w894 | Vendor Advisory Exploit |
https://github.com/langgenius/dify/security/advisories/GHSA-jg5j-c9pq-w894 | Vendor Advisory Exploit |
Configurations
History
14 Oct 2025, 14:10
Type | Values Removed | Values Added |
---|---|---|
First Time |
Langgenius dify
Langgenius |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.1 |
CPE | cpe:2.3:a:langgenius:dify:1.8.1:*:*:*:*:node.js:*:* | |
References | () https://github.com/langgenius/dify/commit/b2d8a7eaf1693841411934e2056042845ab4f354 - Patch | |
References | () https://github.com/langgenius/dify/security/advisories/GHSA-jg5j-c9pq-w894 - Vendor Advisory, Exploit |
25 Sep 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/langgenius/dify/security/advisories/GHSA-jg5j-c9pq-w894 - |
25 Sep 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-25 14:15
Updated : 2025-10-14 14:10
NVD link : CVE-2025-59422
Mitre link : CVE-2025-59422
CVE.ORG link : CVE-2025-59422
JSON object : View
Products Affected
langgenius
- dify
CWE
CWE-284
Improper Access Control