Description
A vulnerability was detected in langgenius dify up to 0.6.9. This vulnerability affects the function get_api_tool_provider_remote_schema of the file api/services/tools/api_tools_manage_service.py of the component ApiToolManageService. Performing a manipulation of the argument url results in server-side request forgery. The attack can be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-20
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Patch
AI Analysis

Impact

The flaw exists in langgenius dify’s ApiToolManageService get_api_tool_provider_remote_schema function, where an attacker can manipulate the url argument to trigger arbitrary HTTP calls from the server. This SSRF allows the adversary to reach internal or external resources, potentially exposing confidential data or enabling lateral movement. The vulnerability is classified as CWE‑918 and can compromise data confidentiality and integrity, though it does not provide direct code execution.

Affected Systems

langgenius dify software versions up to 0.6.9 are affected. The issue resides in the api/services/tools/api_tools_manage_service.py file, so any deployment of dify 0.6.9 or earlier remains vulnerable until updated.

Risk and Exploitability

The CVSS score of 5.3 denotes a moderate severity. The EPSS score is not available, but the flaw has been publicly disclosed and is exploitable from remote clients. It is not yet listed in the CISA KEV catalog. The attack vector is remote, exploiting the server’s ability to resolve and fetch any URL specified by the attacker, potentially targeting internal services.

Generated by OpenCVE AI on April 20, 2026 at 08:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest langgenius dify release that removes the SSRF vulnerability, ensuring the get_api_tool_provider_remote_schema function no longer accepts arbitrary URLs.
  • If an upgrade cannot be performed immediately, restrict access to the get_api_tool_provider_remote_schema endpoint to trusted administrators or IP ranges, or disable the endpoint entirely.
  • Implement outbound request filtering or firewall rules to block unexpected internal requests, limiting the attacker’s ability to reach internal hosts from the application.

Generated by OpenCVE AI on April 20, 2026 at 08:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 07:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in langgenius dify up to 0.6.9. This vulnerability affects the function get_api_tool_provider_remote_schema of the file api/services/tools/api_tools_manage_service.py of the component ApiToolManageService. Performing a manipulation of the argument url results in server-side request forgery. The attack can be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title langgenius dify ApiToolManageService api_tools_manage_service.py get_api_tool_provider_remote_schema server-side request forgery
First Time appeared Langgenius
Langgenius dify
Weaknesses CWE-918
CPEs cpe:2.3:a:langgenius:dify:*:*:*:*:*:*:*:*
Vendors & Products Langgenius
Langgenius dify
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-20T11:12:15.089Z

Reserved: 2026-04-19T16:18:35.592Z

Link: CVE-2026-6617

cve-icon Vulnrichment

Updated: 2026-04-20T11:11:56.773Z

cve-icon NVD

Status : Received

Published: 2026-04-20T08:16:11.597

Modified: 2026-04-20T08:16:11.597

Link: CVE-2026-6617

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T11:30:05Z

Weaknesses