Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63386: n/a

0
Critical
VulnerabilityCVE-2025-63386cvecve-2025-63386
Published: Thu Dec 18 2025 (12/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A Cross-Origin Resource Sharing (CORS) misconfiguration vulnerability exists in Dify v1.9.1 in the /console/api/setup endpoint. The endpoint implements an insecure CORS policy that reflects any Origin header and enables Access-Control-Allow-Credentials: true, permitting arbitrary external domains to make authenticated requests.

AI-Powered Analysis

AILast updated: 01/22/2026, 19:16:00 UTC

Technical Analysis

CVE-2025-63386 identifies a critical security vulnerability in Dify version 1.9.1, specifically within the /console/api/setup endpoint. The issue stems from an insecure Cross-Origin Resource Sharing (CORS) configuration where the server reflects any Origin header value sent by the client and simultaneously enables the Access-Control-Allow-Credentials header set to true. This combination violates secure CORS practices because it allows arbitrary external domains to make authenticated requests using the victim’s credentials or session context. The vulnerability corresponds to CWE-346 (Origin Validation Error), which occurs when the server fails to properly validate the Origin header, thereby permitting cross-origin requests that should be blocked. The CVSS v3.1 base score of 9.1 reflects a critical severity level, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, no user interaction, and high impact on confidentiality and integrity. Exploiting this flaw could allow attackers to perform actions on behalf of authenticated users, such as accessing sensitive configuration data or manipulating system settings, without needing to authenticate themselves. Although no public exploits have been reported yet, the vulnerability’s nature makes it a prime target for attackers aiming to compromise web applications relying on Dify. The absence of patch links suggests that a fix may not yet be publicly available, increasing the urgency for organizations to implement interim mitigations. This vulnerability highlights the critical importance of strict CORS policies that whitelist trusted origins and avoid enabling credentials indiscriminately.

Potential Impact

For European organizations, the impact of CVE-2025-63386 can be severe, especially for those using Dify in environments where sensitive or regulated data is processed. The vulnerability allows attackers to bypass same-origin policy protections, enabling unauthorized access to confidential information and unauthorized modification of system configurations. This can lead to data breaches, loss of intellectual property, disruption of services, and potential compliance violations under regulations such as GDPR. The ability to perform authenticated requests without user consent increases the risk of privilege escalation and lateral movement within networks. Sectors such as finance, healthcare, government, and critical infrastructure that rely on Dify for operational or administrative functions are particularly vulnerable. Additionally, the vulnerability could be leveraged as an initial access vector or part of a multi-stage attack chain, amplifying its impact. The lack of known exploits currently provides a window for proactive defense, but the critical severity score underscores the urgency to address this issue promptly.

Mitigation Recommendations

To mitigate CVE-2025-63386, organizations should immediately audit and restrict the CORS policy on the /console/api/setup endpoint. Specifically, the server must be configured to whitelist only trusted and verified origins rather than reflecting the Origin header dynamically. Access-Control-Allow-Credentials should be set to true only when the origin is explicitly trusted; otherwise, it must be disabled. Implement strict validation logic on the server side to reject requests with unrecognized or suspicious Origin headers. If possible, disable CORS on sensitive endpoints that do not require cross-origin access. Employ Web Application Firewalls (WAFs) to detect and block suspicious cross-origin requests. Monitor logs for unusual patterns of cross-origin requests and unauthorized access attempts. Keep abreast of vendor updates and apply patches as soon as they become available. Additionally, educate developers and administrators about secure CORS configurations and conduct regular security reviews of web application settings. Consider isolating administrative interfaces behind VPNs or IP allowlists to reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 694427b04eb3efac36978401

Added to database: 12/18/2025, 4:11:28 PM

Last enriched: 1/22/2026, 7:16:00 PM

Last updated: 2/7/2026, 11:19:42 AM

Views: 132

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats