Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63387: n/a

0
Unknown
VulnerabilityCVE-2025-63387cvecve-2025-63387
Published: Thu Dec 18 2025 (12/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Dify v1.9.1 is vulnerable to Insecure Permissions. An unauthenticated attacker can directly send HTTP GET requests to the /console/api/system-features endpoint without any authentication credentials or session tokens. The endpoint fails to implement proper authorization checks, allowing anonymous access to sensitive system configuration data.

AI-Powered Analysis

AILast updated: 12/18/2025, 18:56:20 UTC

Technical Analysis

CVE-2025-63387 identifies a security vulnerability in Dify version 1.9.1 related to insecure permissions on the /console/api/system-features HTTP endpoint. This endpoint does not enforce authentication or authorization, allowing any unauthenticated attacker to send HTTP GET requests and retrieve sensitive system configuration data. The absence of session token validation or access control checks means that attackers can bypass normal security mechanisms and gain insight into system features that should be restricted. Such information disclosure can facilitate further attacks, including targeted exploitation or lateral movement within a network. Although the affected versions are not explicitly detailed beyond v1.9.1, the vulnerability is significant due to the direct exposure of sensitive data without any barriers. No public exploits have been reported yet, but the vulnerability's nature makes it relatively straightforward to exploit. The lack of a CVSS score requires an independent severity assessment. Given the impact on confidentiality, ease of exploitation without authentication, and potential scope of affected systems, the vulnerability is assessed as high severity. The vulnerability highlights the critical need for proper access control implementation on administrative or configuration endpoints in web applications.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive system configuration data, which may include information about system features, configurations, or security settings. Such exposure can aid attackers in crafting more effective attacks, potentially leading to data breaches, service disruptions, or unauthorized access to other parts of the network. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and critical infrastructure, face increased compliance risks and reputational damage if exploited. The ease of exploitation without authentication increases the threat surface, making even perimeter defenses insufficient. Additionally, the vulnerability could be leveraged for reconnaissance by advanced persistent threat (APT) groups targeting European entities. The lack of known exploits currently provides a window for mitigation before widespread exploitation occurs.

Mitigation Recommendations

1. Immediately restrict access to the /console/api/system-features endpoint by implementing robust authentication and authorization mechanisms, ensuring only authorized users can query this endpoint. 2. Employ network-level access controls such as IP whitelisting or VPN requirements to limit endpoint exposure. 3. Conduct a thorough audit of all API endpoints to verify proper access controls are in place, especially those exposing system or configuration data. 4. Monitor logs for unusual or unauthorized access attempts to this endpoint to detect potential exploitation attempts early. 5. Engage with the Dify vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available. 6. Implement web application firewalls (WAF) rules to block unauthenticated requests to sensitive endpoints. 7. Educate development and operations teams on secure API design principles to prevent similar issues in future releases.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69444aef4eb3efac36a086c2

Added to database: 12/18/2025, 6:41:51 PM

Last enriched: 12/18/2025, 6:56:20 PM

Last updated: 12/19/2025, 4:07:45 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats