Impact
Dify version 1.14.1 and earlier contain a path traversal flaw that lets authenticated users manipulate requests forwarded to the Plugin Daemon’s internal REST API by using insufficient URL path sanitization. The vulnerability enables traversal out of the tenant’s authorized directory through unencoded dot sequences in task identifiers or manipulated filename parameters, granting access to internal endpoints such as debug interfaces. This can lead to unauthorized data disclosure or execution of privileged operations within the application.
Affected Systems
The affected product is Dify by LangGenius, version 1.14.1 and earlier. The issue is present in all deployments using these releases, including the cloud offering where free user registration is permitted.
Risk and Exploitability
With a CVSS score of 9.2 the flaw is considered very severe. No EPSS data is available, and the vulnerability is not listed in the CISA KEV catalog, but the attack still requires authenticated access to a tenant. Because the cloud service allows unauthenticated account creation, attackers can quickly register, obtain a tenant UUID, and target the vulnerable endpoint. The vulnerability is exploitable without additional software or infrastructure, making it a high-priority risk for any Dify deployment. The lack of input validation allows path traversal, which is the core weakness identified as CWE–23.
OpenCVE Enrichment