Home

Description

Dify version 1.14.1 and prior contain a path traversal vulnerability that allows authenticated users to manipulate requests forwarded to the Plugin Daemon's internal REST API by exploiting insufficient URL path sanitization. Attackers can traverse out of their authorized tenant path using unencoded dot sequences in task identifiers or manipulated filename parameters to access internal endpoints such as debug interfaces, requiring only knowledge of the victim tenant's UUID. NOTE: Dify Cloud allows unauthenticated free self-registration, making account creation trivially accessible to any attacker.

PUBLISHED Reserved 2026-04-22 | Published 2026-05-18 | Updated 2026-05-18 | Assigner VulnCheck




CRITICAL: 9.2CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N

HIGH: 7.7CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L

Problem types

Relative Path Traversal

Product status

Default status
affected

Any version
affected

Credits

Ido Shani and Gal Zaban of Zafran Security finder

References

huntr.com/bounties/35b7ad59-e35d-443f-bf77-387bfb932ec0 technical-description exploit

github.com/langgenius/dify/pull/35796 issue-tracking

www.vulncheck.com/...l-via-plugin-daemon-internal-api-access third-party-advisory

cve.org (CVE-2026-41948)

nvd.nist.gov (CVE-2026-41948)

Download JSON