Impact
This vulnerability allows an authenticated user to read any file uploaded by other users within the same tenant by submitting an arbitrary file identifier to the chat-messages API. The endpoint lacks proper ownership verification and bypasses the intended workspace separation and signed URL authorisation controls. An attacker can therefore retrieve full file contents that should be restricted to the owning user, facilitating disclosure of sensitive information. The weakness is a classic case of insufficient authorization checks, classified as CWE-639.
Affected Systems
Products from the langgenius Dify platform with version numbers earlier than 1.14.0 are affected. No further sub‑version granularity is supplied in the available data.
Risk and Exploitability
The CVSS score of 6 indicates a moderate severity. EPSS data is unavailable, so the current likelihood of exploitation is unknown, and the vulnerability is not listed in CISA KEV. Exploitation requires only that the attacker is already authenticated to the application and can send API requests, suggesting the attack vector is over the network via the chat‑messages endpoint. While the exploit does not require elevated privileges, any authenticated user can misuse it, making it a notable threat to confidentiality within a tenant.
OpenCVE Enrichment