Home

Description

Dify is an open-source LLM app development platform. In version 1.8.1, a broken access control vulnerability on the /console/api/apps/<APP_ID>chat-messages?conversation_id=<CONVERSATION_ID>&limit=10 endpoint allows users in the same workspace to read chat messages of other users. A regular user is able to read the query data and the filename of the admins and probably other users chats, if they know the conversation_id. This impacts the confidentiality of chats. This issue has been patched in version 1.9.0.

PUBLISHED Reserved 2025-09-15 | Published 2025-09-25 | Updated 2025-09-25 | Assigner GitHub_M




MEDIUM: 6.0CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-284: Improper Access Control

Product status

= 1.8.1
affected

References

github.com/...s/dify/security/advisories/GHSA-jg5j-c9pq-w894

github.com/...ommit/b2d8a7eaf1693841411934e2056042845ab4f354

cve.org (CVE-2025-59422)

nvd.nist.gov (CVE-2025-59422)

Download JSON