Path Traversal Vulnerability in Dify Plugin by LangGenius
CVE-2026-41948
Key Information:
- Vendor
Langgenius
- Status
- Vendor
- CVE Published:
- 18 May 2026
Badges
What is CVE-2026-41948?
Dify, a plugin developed by LangGenius, exhibits a path traversal vulnerability that allows authenticated users to exploit insufficient URL path sanitization. By manipulating requests sent to the internal REST API of the Plugin Daemon, attackers can traverse outside their designated tenant paths using unencoded dot sequences in task identifiers or manipulated filename parameters. This issue can potentially provide access to sensitive internal endpoints, including debug interfaces. It is crucial to note that Dify Cloud offers unauthenticated free self-registration, making it easy for attackers to create accounts and exploit this vulnerability against victim tenants.
Affected Version(s)
dify 0 <= 1.14.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
