Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63386: n/a

0
Unknown
VulnerabilityCVE-2025-63386cvecve-2025-63386
Published: Thu Dec 18 2025 (12/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A Cross-Origin Resource Sharing (CORS) misconfiguration vulnerability exists in Dify v1.9.1 in the /console/api/setup endpoint. The endpoint implements an insecure CORS policy that reflects any Origin header and enables Access-Control-Allow-Credentials: true, permitting arbitrary external domains to make authenticated requests.

AI-Powered Analysis

AILast updated: 12/18/2025, 16:26:23 UTC

Technical Analysis

CVE-2025-63386 identifies a critical CORS misconfiguration vulnerability in Dify version 1.9.1, specifically within the /console/api/setup endpoint. The vulnerability arises because the endpoint reflects the Origin header value from incoming requests without validation and sets the Access-Control-Allow-Credentials header to true. This combination allows any external domain to bypass same-origin policy restrictions and make authenticated requests to the vulnerable endpoint using the victim's credentials or session. Essentially, an attacker can craft a malicious website that, when visited by an authenticated user, can perform unauthorized actions or access sensitive data through the victim's browser. The lack of a CVSS score suggests this is a newly published vulnerability with limited public analysis. However, the technical details indicate a high risk because the vulnerability directly undermines the browser's security model, enabling cross-origin attacks that can compromise confidentiality and integrity. No authentication bypass is required beyond the victim being authenticated, and no user interaction beyond visiting a malicious site is necessary. The vulnerability affects all deployments of Dify v1.9.1 that have not patched or mitigated the issue. No known exploits have been reported yet, but the nature of the flaw makes exploitation feasible and potentially widespread once weaponized.

Potential Impact

For European organizations using Dify v1.9.1, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive data and operations. Attackers can leverage the misconfigured CORS policy to perform unauthorized actions on behalf of authenticated users, potentially leading to data leakage, unauthorized configuration changes, or privilege escalation within the affected application. This can disrupt business processes, lead to compliance violations (e.g., GDPR breaches due to data exposure), and damage organizational reputation. The vulnerability's exploitation requires only that the victim visit a malicious website, increasing the attack surface through phishing or drive-by attacks. Organizations relying on Dify for critical internal or customer-facing services may face operational disruptions and increased risk of targeted attacks. The absence of known exploits currently provides a window for proactive mitigation, but the vulnerability's characteristics suggest it could be rapidly exploited once publicly disclosed.

Mitigation Recommendations

Organizations should immediately audit their Dify installations, focusing on version 1.9.1 and the /console/api/setup endpoint. Specific mitigation steps include: 1) Restrict the Access-Control-Allow-Origin header to a whitelist of trusted domains rather than reflecting the Origin header dynamically. 2) Disable Access-Control-Allow-Credentials unless absolutely necessary, and if enabled, ensure strict origin validation. 3) Implement server-side validation to reject requests with suspicious or unauthorized Origin headers. 4) Monitor and log CORS-related requests to detect abnormal patterns indicative of exploitation attempts. 5) Apply any available patches or updates from Dify vendors as soon as they are released. 6) Educate users about phishing risks to reduce the likelihood of visiting malicious sites that could exploit this vulnerability. 7) Consider deploying Web Application Firewalls (WAFs) with rules to detect and block suspicious cross-origin requests targeting the vulnerable endpoint. These measures go beyond generic advice by focusing on precise CORS policy hardening and proactive monitoring tailored to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 694427b04eb3efac36978401

Added to database: 12/18/2025, 4:11:28 PM

Last enriched: 12/18/2025, 4:26:23 PM

Last updated: 12/19/2025, 12:41:00 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats