CVE-2025-67732

Dify is an open-source LLM app development platform. Prior to version 1.11.0, the API key is exposed in plaintext to the frontend, allowing non-administrator users to view and reuse it. This can lead to unauthorized access to third-party services, potentially consuming limited quotas. Version 1.11.0 fixes the issue.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:dify:dify:*:*:*:*:*:*:*:*

History

12 Jan 2026, 18:20

Type Values Removed Values Added
CPE cpe:2.3:a:dify:dify:*:*:*:*:*:*:*:*
First Time Dify
Dify dify
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
References () https://github.com/langgenius/dify/security/advisories/GHSA-phpv-94hg-fv9g - () https://github.com/langgenius/dify/security/advisories/GHSA-phpv-94hg-fv9g - Exploit, Third Party Advisory

05 Jan 2026, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-05 22:15

Updated : 2026-01-12 18:20


NVD link : CVE-2025-67732

Mitre link : CVE-2025-67732

CVE.ORG link : CVE-2025-67732


JSON object : View

Products Affected

dify

  • dify
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-522

Insufficiently Protected Credentials