We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-3466

Unsanitized Input in langgenius/dify



Description

langgenius/dify versions 1.1.0 to 1.1.2 are vulnerable to unsanitized input in the code node, allowing execution of arbitrary code with full root permissions. The vulnerability arises from the ability to override global functions in JavaScript, such as parseInt, before sandbox security restrictions are imposed. This can lead to unauthorized access to secret keys, internal network servers, and lateral movement within dify.ai. The issue is resolved in version 1.1.3.

Reserved 2025-04-09 | Published 2025-07-07 | Updated 2025-07-07 | Assigner @huntr_ai


CRITICAL: 9.8CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-1100 Insufficient Isolation of System-Dependent Functions

Product status

Any version before 1.1.3
affected

References

huntr.com/bounties/f8dc17a3-5536-4944-a680-24070903cd2d

github.com/...ommit/1be0d26c1feb4bcbbdd2b4ae4eeb25874aadaddb

cve.org (CVE-2025-3466)

nvd.nist.gov (CVE-2025-3466)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-3466

Support options

Helpdesk Chat, Email, Knowledgebase