CVE ID: CVE-2025-63387 Date: 2025-12-18 Vendor: LangGenius (Dify) Product: Dify Affected Versions: v1.9.1 Vulnerability Type: Insecure Permissions / Authentication Bypass Severity: Medium (Information Disclosure)
Dify v1.9.1 is vulnerable to Insecure Permissions. An unauthenticated attacker can directly send HTTP GET requests to the /console/api/system-features endpoint without any authentication credentials or session tokens. The endpoint fails to implement proper authorization checks, allowing anonymous access to sensitive system configuration data.
- Component:
/console/api/system-featuresAPI endpoint, authentication middleware - Vulnerability: Lack of authentication checks on the API endpoint.
Attack Type: Remote
Attack Vectors:
An unauthenticated attacker can directly send HTTP GET requests to the /console/api/system-features endpoint without any authentication credentials or session tokens. The endpoint fails to implement proper authorization checks, allowing anonymous access to sensitive system configuration data.
Impact:
- Information Disclosure: Exposure of sensitive system configuration data to unauthorized users.
- Vendor Repository: https://github.com/langgenius/dify
- Discussions: https://github.com/langgenius/dify/discussions
Discovered and reported by Zhihuang Liu (herecristliu@gmail.com)