๐Ÿ” CVE Alert

CVE-2026-41949

MEDIUM 5.9

Dify v1.14.1 Authorization Bypass via File Preview Endpoint

CVSS Score
5.9
EPSS Score
0.0%
EPSS Percentile
9th

Dify version 1.14.1 and prior contain an authorization bypass vulnerability in the file preview endpoint that allows any authenticated user to read up to 3,000 characters of any uploaded document across all tenants and workspaces using only the file's UUID. Attackers can access the /console/api/files/{file_id}/preview endpoint with an intercepted file UUID to extract sensitive content from documents without ownership or workspace permission verification. NOTE: Dify Cloud allows unauthenticated free self-registration, making account creation trivially accessible to any attacker.

CWE CWE-639
Vendor langgenius
Product dify
Published May 18, 2026
Last Updated May 19, 2026
Stay Ahead of the Next One

Get instant alerts for langgenius dify

Be the first to know when new medium vulnerabilities affecting langgenius dify are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

langgenius / dify
0 โ‰ค 1.14.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
huntr.com: https://huntr.com/bounties/d50a0240-7951-4939-b989-9bded66c7682 github.com: https://github.com/langgenius/dify/pull/35797 vulncheck.com: https://www.vulncheck.com/advisories/dify-authorization-bypass-via-file-preview-endpoint

Credits

Ido Shani and Gal Zaban of Zafran Security