Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 26 Sep 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Langgenius
Langgenius dify |
|
Vendors & Products |
Langgenius
Langgenius dify |
Thu, 25 Sep 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 25 Sep 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Dify is an open-source LLM app development platform. In version 1.8.1, a broken access control vulnerability on the /console/api/apps/<APP_ID>chat-messages?conversation_id=<CONVERSATION_ID>&limit=10 endpoint allows users in the same workspace to read chat messages of other users. A regular user is able to read the query data and the filename of the admins and probably other users chats, if they know the conversation_id. This impacts the confidentiality of chats. This issue has been patched in version 1.9.0. | |
Title | Dify Has Broken Access Control on Log Message Endpoint Allows Reading of Chats of Others | |
Weaknesses | CWE-284 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-25T15:14:52.506Z
Reserved: 2025-09-15T19:13:16.904Z
Link: CVE-2025-59422

Updated: 2025-09-25T15:14:47.134Z

Status : Awaiting Analysis
Published: 2025-09-25T14:15:45.677
Modified: 2025-09-26T14:32:53.583
Link: CVE-2025-59422

No data.

Updated: 2025-09-26T11:35:47Z