Server-Side Request Forgery Vulnerability in LangGenius Dify Software
CVE-2026-6618
Key Information:
- Vendor
Langgenius
- Status
- Vendor
- CVE Published:
- 20 April 2026
Badges
What is CVE-2026-6618?
A security flaw has been identified in LangGenius Dify (up to version 1.13.3) that allows for server-side request forgery (SSRF) due to improper handling of the URL argument in the 'parse_openai_plugin_json_to_tool_bundle' function located in 'api/core/tools/utils/parser.py'. This vulnerability can be exploited remotely, enabling attackers to manipulate server requests and potentially access sensitive information. Despite early notifications to the vendor, no responses have been received, highlighting the urgency for users to secure their installations.
Affected Version(s)
dify 1.13.0
dify 1.13.1
dify 1.13.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
