Home

Description

Dify is an LLM application development platform. In Dify versions through 1.9.1, the MCP OAuth component is vulnerable to cross-site scripting when a victim connects to an attacker-controlled remote MCP server. The vulnerability exists in the OAuth flow implementation where the authorization_url provided by a remote MCP server is directly passed to window.open without validation or sanitization. An attacker can craft a malicious MCP server that returns a JavaScript URI (such as javascript:alert(1)) in the authorization_url field, which is then executed when the victim attempts to connect to the MCP server. This allows the attacker to execute arbitrary JavaScript in the context of the Dify application.

PUBLISHED Reserved 2025-09-04 | Published 2025-10-17 | Updated 2025-10-17 | Assigner GitHub_M




LOW: 2.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

<= 1.9.1
affected

References

github.com/...s/dify/security/advisories/GHSA-9jch-j9qf-vqfw

github.com/...ommit/bfda4ce7e6f39d43a4420e97e23a18edcfe3e3d3

cve.org (CVE-2025-58747)

nvd.nist.gov (CVE-2025-58747)

Download JSON