CVE-2025-67732: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in langgenius dify
CVE-2025-67732 is a high-severity vulnerability in langgenius' open-source LLM app development platform, Dify, affecting versions prior to 1. 11. 0. The issue involves exposure of the API key in plaintext on the frontend, allowing non-administrator users to access and reuse it without authorization. This can lead to unauthorized access to third-party services, potentially exhausting service quotas or causing service disruptions. The vulnerability requires no user interaction and can be exploited remotely with low complexity. The flaw impacts confidentiality by exposing sensitive credentials and could indirectly affect availability by depleting service quotas. The vendor fixed the issue in version 1. 11. 0 by removing API key exposure.
AI Analysis
Technical Summary
CVE-2025-67732 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information) and CWE-522 (Insufficiently Protected Credentials) affecting the langgenius Dify platform, an open-source tool for developing large language model (LLM) applications. Prior to version 1.11.0, Dify exposes its API key in plaintext on the frontend interface, making it accessible to any user with non-administrator privileges. This exposure allows unauthorized actors to view and reuse the API key, granting them unauthorized access to third-party services integrated via the API key. The vulnerability does not require user interaction and can be exploited remotely with low attack complexity and no authentication needed beyond non-admin user access. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:L/SA:L) indicates network attack vector, low complexity, no attack or user interaction, partial privileges required, and high impact on confidentiality. The main risk is unauthorized consumption of third-party service quotas, potentially leading to service disruption or financial costs. The issue was addressed in version 1.11.0 by removing the API key from the frontend and securing it server-side. No known exploits are currently reported in the wild, but the high severity and ease of exploitation make timely patching critical.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those leveraging Dify for AI and LLM application development. Exposure of API keys can lead to unauthorized access to third-party services, resulting in quota exhaustion, service disruption, or unexpected costs. Confidentiality is compromised as sensitive credentials are leaked to unauthorized users, potentially enabling further lateral attacks if attackers use the API key to pivot. Organizations relying on third-party AI services with limited quotas are particularly vulnerable to denial of service or degraded performance. The impact extends to compliance risks under GDPR if sensitive data or service integrity is affected. Given the growing adoption of AI platforms in Europe, this vulnerability could affect sectors such as technology, finance, and research institutions. The lack of known exploits currently reduces immediate threat but does not diminish the urgency of mitigation due to the vulnerability's high severity and ease of exploitation.
Mitigation Recommendations
1. Upgrade all instances of Dify to version 1.11.0 or later immediately to eliminate the API key exposure. 2. Audit and rotate any API keys that may have been exposed prior to patching to prevent unauthorized reuse. 3. Implement strict role-based access controls (RBAC) to limit non-administrator user privileges and reduce the risk of credential exposure. 4. Employ network segmentation and monitoring to detect unusual API usage patterns indicative of abuse. 5. Use environment variables or secure vaults to store API keys server-side, ensuring they are never exposed in frontend code or client-side logs. 6. Conduct regular security reviews and penetration testing focused on credential management and frontend/backend separation. 7. Educate developers and administrators on secure API key handling and the risks of exposing sensitive information in client-side code. 8. Monitor third-party service usage quotas closely to detect anomalies that may indicate unauthorized consumption.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-67732: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in langgenius dify
Description
CVE-2025-67732 is a high-severity vulnerability in langgenius' open-source LLM app development platform, Dify, affecting versions prior to 1. 11. 0. The issue involves exposure of the API key in plaintext on the frontend, allowing non-administrator users to access and reuse it without authorization. This can lead to unauthorized access to third-party services, potentially exhausting service quotas or causing service disruptions. The vulnerability requires no user interaction and can be exploited remotely with low complexity. The flaw impacts confidentiality by exposing sensitive credentials and could indirectly affect availability by depleting service quotas. The vendor fixed the issue in version 1. 11. 0 by removing API key exposure.
AI-Powered Analysis
Technical Analysis
CVE-2025-67732 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information) and CWE-522 (Insufficiently Protected Credentials) affecting the langgenius Dify platform, an open-source tool for developing large language model (LLM) applications. Prior to version 1.11.0, Dify exposes its API key in plaintext on the frontend interface, making it accessible to any user with non-administrator privileges. This exposure allows unauthorized actors to view and reuse the API key, granting them unauthorized access to third-party services integrated via the API key. The vulnerability does not require user interaction and can be exploited remotely with low attack complexity and no authentication needed beyond non-admin user access. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:L/SA:L) indicates network attack vector, low complexity, no attack or user interaction, partial privileges required, and high impact on confidentiality. The main risk is unauthorized consumption of third-party service quotas, potentially leading to service disruption or financial costs. The issue was addressed in version 1.11.0 by removing the API key from the frontend and securing it server-side. No known exploits are currently reported in the wild, but the high severity and ease of exploitation make timely patching critical.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those leveraging Dify for AI and LLM application development. Exposure of API keys can lead to unauthorized access to third-party services, resulting in quota exhaustion, service disruption, or unexpected costs. Confidentiality is compromised as sensitive credentials are leaked to unauthorized users, potentially enabling further lateral attacks if attackers use the API key to pivot. Organizations relying on third-party AI services with limited quotas are particularly vulnerable to denial of service or degraded performance. The impact extends to compliance risks under GDPR if sensitive data or service integrity is affected. Given the growing adoption of AI platforms in Europe, this vulnerability could affect sectors such as technology, finance, and research institutions. The lack of known exploits currently reduces immediate threat but does not diminish the urgency of mitigation due to the vulnerability's high severity and ease of exploitation.
Mitigation Recommendations
1. Upgrade all instances of Dify to version 1.11.0 or later immediately to eliminate the API key exposure. 2. Audit and rotate any API keys that may have been exposed prior to patching to prevent unauthorized reuse. 3. Implement strict role-based access controls (RBAC) to limit non-administrator user privileges and reduce the risk of credential exposure. 4. Employ network segmentation and monitoring to detect unusual API usage patterns indicative of abuse. 5. Use environment variables or secure vaults to store API keys server-side, ensuring they are never exposed in frontend code or client-side logs. 6. Conduct regular security reviews and penetration testing focused on credential management and frontend/backend separation. 7. Educate developers and administrators on secure API key handling and the risks of exposing sensitive information in client-side code. 8. Monitor third-party service usage quotas closely to detect anomalies that may indicate unauthorized consumption.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-10T20:04:28.290Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695c32b23839e44175939728
Added to database: 1/5/2026, 9:52:50 PM
Last enriched: 1/13/2026, 1:04:48 AM
Last updated: 2/7/2026, 6:29:40 AM
Views: 223
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumCVE-2025-12159: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.