← Back to CVEs
CVE-2025-43862
HIGH7.6
Description
Dify is an open-source LLM app development platform. Prior to version 0.6.12, a normal user is able to access and modify APP orchestration, even though the web UI of APP orchestration is not presented for a normal user. This access control flaw allows non-admin users to make unauthorized access and changes on the APPSs. This issue has been patched in version 0.6.12. A workaround for this vulnerability involves updating the the access control mechanisms to enforce stricter user role permissions and implementing role-based access controls (RBAC) to ensure that only users with admin privileges can access Orchestration of the APPs.
CVE Details
CVSS v3.1 Score7.6
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published4/25/2025
Last Modified8/1/2025
Sourcenvd
Honeypot Sightings0
Affected Products
langgenius:dify
Weaknesses (CWE)
CWE-284CWE-862
References
https://github.com/langgenius/dify/pull/5266(security-advisories@github.com)
https://github.com/langgenius/dify/security/advisories/GHSA-6pw4-jqhv-3626(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.