CVE-2025-63387

Dify v1.9.1 is vulnerable to Insecure Permissions. An unauthenticated attacker can directly send HTTP GET requests to the /console/api/system-features endpoint without any authentication credentials or session tokens. The endpoint fails to implement proper authorization checks, allowing anonymous access to sensitive system configuration data. NOTE: The maintainer states that the endpoint is unauthenticated by design and serves as a bootstrap mechanism required for the dashboard initialization. They also state that the description inaccurately classifies the returned data as sensitive system configuration, stating that the data is non-sensitive and required for client-side rendering. No PII, credentials, or secrets are exposed.
Configurations

Configuration 1 (hide)

cpe:2.3:a:langgenius:dify:1.9.1:*:*:*:*:node.js:*:*

History

22 Jan 2026, 20:16

Type Values Removed Values Added
References
  • () https://github.com/langgenius/dify/issues/31368#issuecomment-3783712203 -
  • () https://github.com/langgenius/dify/pull/31392 -
  • () https://github.com/langgenius/dify/pull/31417 -
Summary (en) Dify v1.9.1 is vulnerable to Insecure Permissions. An unauthenticated attacker can directly send HTTP GET requests to the /console/api/system-features endpoint without any authentication credentials or session tokens. The endpoint fails to implement proper authorization checks, allowing anonymous access to sensitive system configuration data. (en) Dify v1.9.1 is vulnerable to Insecure Permissions. An unauthenticated attacker can directly send HTTP GET requests to the /console/api/system-features endpoint without any authentication credentials or session tokens. The endpoint fails to implement proper authorization checks, allowing anonymous access to sensitive system configuration data. NOTE: The maintainer states that the endpoint is unauthenticated by design and serves as a bootstrap mechanism required for the dashboard initialization. They also state that the description inaccurately classifies the returned data as sensitive system configuration, stating that the data is non-sensitive and required for client-side rendering. No PII, credentials, or secrets are exposed.

22 Jan 2026, 18:16

Type Values Removed Values Added
References
  • () https://gist.github.com/Cristliu/dfc5f3a31dc6d7fff2754867e5c649a5 -

30 Dec 2025, 19:39

Type Values Removed Values Added
CPE cpe:2.3:a:langgenius:dify:1.9.1:*:*:*:*:node.js:*:*
First Time Langgenius
Langgenius dify
References () https://gist.github.com/Cristliu/cddc0cbbf354de51106ab63a11be94af - () https://gist.github.com/Cristliu/cddc0cbbf354de51106ab63a11be94af - Third Party Advisory
References () https://github.com/langgenius/dify/discussions - () https://github.com/langgenius/dify/discussions - Issue Tracking

19 Dec 2025, 18:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-284

18 Dec 2025, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-18 19:16

Updated : 2026-01-22 20:16


NVD link : CVE-2025-63387

Mitre link : CVE-2025-63387

CVE.ORG link : CVE-2025-63387


JSON object : View

Products Affected

langgenius

  • dify
CWE
CWE-284

Improper Access Control