← Volver a CVEs
CVE-2025-43862
HIGH7.6
Descripcion
Dify is an open-source LLM app development platform. Prior to version 0.6.12, a normal user is able to access and modify APP orchestration, even though the web UI of APP orchestration is not presented for a normal user. This access control flaw allows non-admin users to make unauthorized access and changes on the APPSs. This issue has been patched in version 0.6.12. A workaround for this vulnerability involves updating the the access control mechanisms to enforce stricter user role permissions and implementing role-based access controls (RBAC) to ensure that only users with admin privileges can access Orchestration of the APPs.
Detalles CVE
Puntuacion CVSS v3.17.6
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado4/25/2025
Ultima modificacion8/1/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
langgenius:dify
Debilidades (CWE)
CWE-284CWE-862
Referencias
https://github.com/langgenius/dify/pull/5266(security-advisories@github.com)
https://github.com/langgenius/dify/security/advisories/GHSA-6pw4-jqhv-3626(security-advisories@github.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.