CVE-2026-41947
Dify v1.14.1 Authorization Bypass via Trace Configuration Endpoints
CVSS Score
7.4
EPSS Score
0.0%
EPSS Percentile
0th
Dify version 1.14.1 and prior contains an authorization bypass vulnerability that allows authenticated editor users to set and enable trace configurations for any application regardless of tenant ownership. Attackers can exploit missing tenant ownership checks in the trace configuration endpoints to redirect all messages and responses from victim applications to attacker-controlled LLM trace providers. NOTE: Dify Cloud allows unauthenticated free self-registration, making account creation trivially accessible to any attacker.
| CWE | CWE-639 |
| Vendor | langgenius |
| Product | dify |
| Published | May 18, 2026 |
| Last Updated | May 18, 2026 |
Stay Ahead of the Next One
Get instant alerts for langgenius dify
Be the first to know when new high vulnerabilities affecting langgenius dify are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Affected Versions
langgenius / dify
0 โค 1.14.1
References
Credits
Ido Shani and Gal Zaban of Zafran Security