CVE-2025-67732: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in langgenius dify
Dify is an open-source LLM app development platform. Prior to version 1.11.0, the API key is exposed in plaintext to the frontend, allowing non-administrator users to view and reuse it. This can lead to unauthorized access to third-party services, potentially consuming limited quotas. Version 1.11.0 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-67732 is a vulnerability identified in the langgenius Dify platform, an open-source tool for developing large language model (LLM) applications. Before version 1.11.0, Dify's frontend exposes the API key in plaintext to all users, including those without administrative privileges. This exposure violates secure credential management principles and allows unauthorized actors to obtain and reuse the API key. The API key typically grants access to third-party services integrated with Dify, such as cloud-based AI APIs or data providers. Unauthorized use of these keys can lead to quota exhaustion, financial costs, or unauthorized data access. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information) and CWE-522 (Insufficiently Protected Credentials). The CVSS 4.0 score is 8.4 (high), reflecting network attack vector, no authentication required, no user interaction, and high impact on confidentiality and partial impact on integrity. Exploitation does not require user interaction and can be performed remotely by any user with access to the frontend interface. The vulnerability was publicly disclosed in early 2026 and fixed in version 1.11.0 of Dify. No known exploits are currently reported in the wild, but the risk remains significant due to the ease of exploitation and sensitive nature of the exposed credentials.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially those leveraging the Dify platform for AI application development or integrating third-party AI services. Exposure of API keys can lead to unauthorized consumption of third-party service quotas, resulting in service disruptions or unexpected costs. Confidential data accessed via these APIs could be compromised, impacting data privacy compliance under GDPR. Additionally, unauthorized API usage could degrade service integrity and availability, affecting business operations. Organizations relying on AI services for critical functions may face operational delays or reputational damage if attackers misuse exposed credentials. The vulnerability also increases the attack surface for supply chain attacks, as compromised API keys could be used to pivot into other connected systems or services. Given the growing adoption of AI platforms in Europe, the impact could be widespread if not mitigated promptly.
Mitigation Recommendations
The primary mitigation is to upgrade all instances of Dify to version 1.11.0 or later, where the API key exposure issue is resolved. Organizations should audit their deployments to identify affected versions and enforce immediate patching. Additionally, restrict frontend access to trusted users only, implementing role-based access controls to limit exposure. Rotate all API keys that may have been exposed prior to patching to invalidate compromised credentials. Employ network-level protections such as web application firewalls (WAFs) to monitor and block suspicious API key usage patterns. Implement monitoring and alerting for unusual third-party service consumption to detect potential abuse early. Educate developers and administrators on secure credential management practices, ensuring sensitive keys are never exposed in client-side code. Finally, consider using environment variables or secure vaults for storing API keys, and enforce least privilege principles on API keys to minimize potential damage if compromised.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2025-67732: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in langgenius dify
Description
Dify is an open-source LLM app development platform. Prior to version 1.11.0, the API key is exposed in plaintext to the frontend, allowing non-administrator users to view and reuse it. This can lead to unauthorized access to third-party services, potentially consuming limited quotas. Version 1.11.0 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-67732 is a vulnerability identified in the langgenius Dify platform, an open-source tool for developing large language model (LLM) applications. Before version 1.11.0, Dify's frontend exposes the API key in plaintext to all users, including those without administrative privileges. This exposure violates secure credential management principles and allows unauthorized actors to obtain and reuse the API key. The API key typically grants access to third-party services integrated with Dify, such as cloud-based AI APIs or data providers. Unauthorized use of these keys can lead to quota exhaustion, financial costs, or unauthorized data access. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information) and CWE-522 (Insufficiently Protected Credentials). The CVSS 4.0 score is 8.4 (high), reflecting network attack vector, no authentication required, no user interaction, and high impact on confidentiality and partial impact on integrity. Exploitation does not require user interaction and can be performed remotely by any user with access to the frontend interface. The vulnerability was publicly disclosed in early 2026 and fixed in version 1.11.0 of Dify. No known exploits are currently reported in the wild, but the risk remains significant due to the ease of exploitation and sensitive nature of the exposed credentials.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially those leveraging the Dify platform for AI application development or integrating third-party AI services. Exposure of API keys can lead to unauthorized consumption of third-party service quotas, resulting in service disruptions or unexpected costs. Confidential data accessed via these APIs could be compromised, impacting data privacy compliance under GDPR. Additionally, unauthorized API usage could degrade service integrity and availability, affecting business operations. Organizations relying on AI services for critical functions may face operational delays or reputational damage if attackers misuse exposed credentials. The vulnerability also increases the attack surface for supply chain attacks, as compromised API keys could be used to pivot into other connected systems or services. Given the growing adoption of AI platforms in Europe, the impact could be widespread if not mitigated promptly.
Mitigation Recommendations
The primary mitigation is to upgrade all instances of Dify to version 1.11.0 or later, where the API key exposure issue is resolved. Organizations should audit their deployments to identify affected versions and enforce immediate patching. Additionally, restrict frontend access to trusted users only, implementing role-based access controls to limit exposure. Rotate all API keys that may have been exposed prior to patching to invalidate compromised credentials. Employ network-level protections such as web application firewalls (WAFs) to monitor and block suspicious API key usage patterns. Implement monitoring and alerting for unusual third-party service consumption to detect potential abuse early. Educate developers and administrators on secure credential management practices, ensuring sensitive keys are never exposed in client-side code. Finally, consider using environment variables or secure vaults for storing API keys, and enforce least privilege principles on API keys to minimize potential damage if compromised.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-10T20:04:28.290Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695c32b23839e44175939728
Added to database: 1/5/2026, 9:52:50 PM
Last enriched: 1/5/2026, 10:07:28 PM
Last updated: 1/8/2026, 12:02:38 PM
Views: 73
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-1182: CWE-427 Uncontrolled Search Path Element in Mitsubishi Electric Iconics Digital Solutions GENESIS64
HighCVE-2025-66001: CWE-295: Improper Certificate Validation in SUSE neuvector
HighCVE-2026-21874: CWE-772: Missing Release of Resource after Effective Lifetime in zauberzeug nicegui
MediumCVE-2026-21873: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
HighCVE-2026-21872: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.