Impact
This vulnerability resides in the openInNewTab function of ImagePreview within the Dify image‑uploader component. By manipulating the filename argument, an attacker can inject malicious script that is executed in the context of the page, enabling arbitrary script execution on the victim’s browser. The flaw is a classic reflected XSS issue, classified as CWE‑79, and permits remote exploitation. The attack originates from external input supplied to the image preview feature and can be triggered without any user interaction beyond loading the crafted asset.
Affected Systems
langgenius Dify versions up to 1.13.3 are affected. The vulnerability is confined to the web application’s image‑uploader module and does not influence database or backend services beyond the client‑side rendering.
Risk and Exploitability
The CVSS score of 5.1 denotes a medium risk category. EPSS data is not currently available, and the flaw is not listed in CISA’s KEV catalog. The exploit can be launched remotely by sending a manipulated filename to the openInNewTab handler, and once executed, the injected script runs with the permissions of the logged‑in user. Because the flaw relies on user‑visible rendering of image links, it does not require elevated privileges or network access beyond the standard application traffic.
OpenCVE Enrichment