Home

Description

Dify is an open-source LLM app development platform. Prior to version 1.13.1, using the method POST /api/files/upload, any unauthenticated user can upload an SVG file with XSS. The method POST /v1/files/upload, which requires authentication through the application API, is also vulnerable. This issue has been patched in version 1.13.1.

PUBLISHED Reserved 2026-04-24 | Published 2026-05-04 | Updated 2026-05-04 | Assigner GitHub_M




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 1.13.1
affected

References

github.com/...s/dify/security/advisories/GHSA-cg94-8v83-7hjj exploit

github.com/...s/dify/security/advisories/GHSA-cg94-8v83-7hjj

github.com/langgenius/dify/releases/tag/1.13.1

cve.org (CVE-2026-42138)

nvd.nist.gov (CVE-2026-42138)

Download JSON