Home

Description

Dify version 1.14.1 and prior contain an authorization bypass vulnerability in the file preview endpoint that allows any authenticated user to read up to 3,000 characters of any uploaded document across all tenants and workspaces using only the file's UUID. Attackers can access the /console/api/files/{file_id}/preview endpoint with an intercepted file UUID to extract sensitive content from documents without ownership or workspace permission verification. NOTE: Dify Cloud allows unauthenticated free self-registration, making account creation trivially accessible to any attacker.

PUBLISHED Reserved 2026-04-22 | Published 2026-05-18 | Updated 2026-05-19 | Assigner VulnCheck




HIGH: 8.2CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

MEDIUM: 5.9CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

Authorization Bypass Through User-Controlled Key

Product status

Default status
affected

Any version
affected

Credits

Ido Shani and Gal Zaban of Zafran Security finder

References

huntr.com/bounties/d50a0240-7951-4939-b989-9bded66c7682 technical-description exploit

github.com/langgenius/dify/pull/35797 issue-tracking patch

www.vulncheck.com/...zation-bypass-via-file-preview-endpoint third-party-advisory

cve.org (CVE-2026-41949)

nvd.nist.gov (CVE-2026-41949)

Download JSON