Impact
The vulnerability is an Insecure Direct Object Reference that permits any authenticated user to delete another user's chat conversation. It stems from inadequate authorization checks on the DELETE /console/api/installed-apps/<appId>/conversations/<conversationId> endpoint, aligning with CWE-284 (Improper Authorization). The consequence is the loss of user data and potential privacy violations, but it does not enable code execution or network compromise.
Affected Systems
The issue affects the open‑source LLM application platform Dify from langgenius prior to version 1.13.1. Users who have authenticated access to the console API can send delete requests for conversations they do not own.
Risk and Exploitability
With a CVSS score of 5.3 the vulnerability is considered moderate. The EPSS score of 0.00038 indicates a very low probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is straightforward: any authenticated user can construct a DELETE request for a conversation ID belonging to another user. The impact is limited to data loss, but the simplicity of the request pathway means the risk remains significant for environments where user data persistence is critical.
OpenCVE Enrichment