CVE-2025-63387

Dify v1.9.1 is vulnerable to Insecure Permissions. An unauthenticated attacker can directly send HTTP GET requests to the /console/api/system-features endpoint without any authentication credentials or session tokens. The endpoint fails to implement proper authorization checks, allowing anonymous access to sensitive system configuration data. NOTE: The maintainer states that the endpoint is unauthenticated by design and serves as a bootstrap mechanism required for the dashboard initialization. They also state that the description inaccurately classifies the returned data as sensitive system configuration, stating that the data is non-sensitive and required for client-side rendering. No PII, credentials, or secrets are exposed.
Configurations

Configuration 1 (hide)

cpe:2.3:a:langgenius:dify:1.9.1:*:*:*:*:node.js:*:*

History

No history.

Information

Published : 2025-12-18 19:16

Updated : 2026-01-22 20:16


NVD link : CVE-2025-63387

Mitre link : CVE-2025-63387

CVE.ORG link : CVE-2025-63387


JSON object : View

Products Affected

langgenius

  • dify
CWE
CWE-284

Improper Access Control