Cross-Site Scripting Vulnerability in Dify LLM Application Development Platform
CVE-2025-58747

2LOW

Key Information:

Vendor

Langgenius

Status
Vendor
CVE Published:
17 October 2025

What is CVE-2025-58747?

Dify, a leading LLM application development platform, is susceptible to cross-site scripting due to a flaw in its MCP OAuth component. This vulnerability affects versions up to 1.9.1, allowing attackers to exploit the OAuth flow. When a victim connects to an attacker-controlled MCP server, the maliciously crafted server can pass an unvalidated authorization_url directly to the window.open function. This oversight enables an attacker to execute arbitrary JavaScript within the Dify application context, potentially compromising user data and application integrity. To mitigate risks, it is essential for users to upgrade to the latest version and implement secure coding practices in OAuth flows.

Affected Version(s)

dify <= 1.9.1

References

CVSS V4

Score:
2
Severity:
LOW
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.