Description
Dify is an open-source LLM app development platform. Prior to 1.13.1, the method `DELETE /console/api/installed-apps/<appId>/conversations/<conversationId>` has poor authorization checking and allows any Dify-authenticated user to delete someone else's chat history. Version 1.13.1 patches the issue.
Published: 2026-04-20
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Data Deletion
Action: Patch
AI Analysis

Impact

The vulnerability is an Insecure Direct Object Reference that permits any authenticated user to delete another user's chat conversation. It stems from inadequate authorization checks on the DELETE /console/api/installed-apps/<appId>/conversations/<conversationId> endpoint, aligning with CWE-284 (Improper Authorization). The consequence is the loss of user data and potential privacy violations, but it does not enable code execution or network compromise.

Affected Systems

The issue affects the open‑source LLM application platform Dify from langgenius prior to version 1.13.1. Users who have authenticated access to the console API can send delete requests for conversations they do not own.

Risk and Exploitability

With a CVSS score of 5.3 the vulnerability is considered moderate. The EPSS score of 0.00038 indicates a very low probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is straightforward: any authenticated user can construct a DELETE request for a conversation ID belonging to another user. The impact is limited to data loss, but the simplicity of the request pathway means the risk remains significant for environments where user data persistence is critical.

Generated by OpenCVE AI on April 22, 2026 at 03:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Dify version 1.13.1 or later, which contains the authorization fix.
  • Implement additional ownership checks on delete operations so that only the conversation owner or an administrator can delete a conversation.
  • Monitor API logs for unauthorized delete attempts and alert security staff to suspicious activity.

Generated by OpenCVE AI on April 22, 2026 at 03:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Dify
Dify dify
CPEs cpe:2.3:a:dify:dify:*:*:*:*:*:*:*:*
Vendors & Products Dify
Dify dify
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Tue, 21 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 21 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
First Time appeared Langgenius
Langgenius dify
Vendors & Products Langgenius
Langgenius dify

Mon, 20 Apr 2026 23:15:00 +0000

Type Values Removed Values Added
Description Dify is an open-source LLM app development platform. Prior to 1.13.1, the method `DELETE /console/api/installed-apps/<appId>/conversations/<conversationId>` has poor authorization checking and allows any Dify-authenticated user to delete someone else's chat history. Version 1.13.1 patches the issue.
Title Dify has IDOR in deleting someone else's chat conversation
Weaknesses CWE-284
CWE-863
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-21T13:36:45.614Z

Reserved: 2026-03-25T16:21:40.868Z

Link: CVE-2026-34082

cve-icon Vulnrichment

Updated: 2026-04-21T13:36:37.072Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-20T23:16:24.250

Modified: 2026-04-23T15:12:29.810

Link: CVE-2026-34082

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T03:30:06Z

Weaknesses