๐Ÿ” CVE Alert

CVE-2026-41948

HIGH 7.7

Dify v1.14.1 Path Traversal via Plugin Daemon Internal API Access

CVSS Score
7.7
EPSS Score
0.0%
EPSS Percentile
0th

Dify version 1.14.1 and prior contain a path traversal vulnerability that allows authenticated users to manipulate requests forwarded to the Plugin Daemon's internal REST API by exploiting insufficient URL path sanitization. Attackers can traverse out of their authorized tenant path using unencoded dot sequences in task identifiers or manipulated filename parameters to access internal endpoints such as debug interfaces, requiring only knowledge of the victim tenant's UUID. NOTE: Dify Cloud allows unauthenticated free self-registration, making account creation trivially accessible to any attacker.

CWE CWE-23
Vendor langgenius
Product dify
Published May 18, 2026
Last Updated May 18, 2026
Stay Ahead of the Next One

Get instant alerts for langgenius dify

Be the first to know when new high vulnerabilities affecting langgenius dify are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
Low

Affected Versions

langgenius / dify
0 โ‰ค 1.14.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
huntr.com: https://huntr.com/bounties/35b7ad59-e35d-443f-bf77-387bfb932ec0 github.com: https://github.com/langgenius/dify/pull/35796 vulncheck.com: https://www.vulncheck.com/advisories/dify-path-traversal-via-plugin-daemon-internal-api-access

Credits

Ido Shani and Gal Zaban of Zafran Security