Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28288: CWE-204: Observable Response Discrepancy in langgenius dify

0
Medium
VulnerabilityCVE-2026-28288cvecve-2026-28288cwe-204
Published: Fri Feb 27 2026 (02/27/2026, 20:25:24 UTC)
Source: CVE Database V5
Vendor/Project: langgenius
Product: dify

Description

CVE-2026-28288 is a medium-severity vulnerability in the open-source LLM app development platform Dify (versions prior to 1. 9. 0). The issue arises from observable response discrepancies in the Dify API when queried with existing versus non-existent email accounts. This behavior allows attackers to enumerate registered email addresses without authentication or user interaction. The vulnerability is classified under CWE-204 (Observable Response Discrepancy). Although no known exploits are currently in the wild, the flaw can lead to privacy violations and facilitate further targeted attacks such as phishing. The vulnerability has a CVSS 4. 0 base score of 5. 5, reflecting its moderate impact and ease of exploitation over the network.

AI-Powered Analysis

AILast updated: 02/27/2026, 20:57:16 UTC

Technical Analysis

CVE-2026-28288 identifies an information disclosure vulnerability in the Dify platform, an open-source tool for developing applications using large language models (LLMs). Prior to version 1.9.0, the Dify API responses differ noticeably when queried with email addresses associated with existing accounts compared to those that do not exist. This discrepancy enables an unauthenticated remote attacker to perform user enumeration attacks by systematically testing email addresses and observing the API's differing responses. The vulnerability is categorized under CWE-204, which involves observable response discrepancies that leak information about system state or data. The CVSS 4.0 vector indicates the attack requires no privileges, no user interaction, and can be executed remotely over the network with low complexity. The impact is limited to confidentiality as it leaks information about registered users, potentially aiding social engineering or brute force attacks. The vendor addressed this issue in Dify version 1.9.0 by standardizing API responses to prevent enumeration. No public exploits have been reported yet, but the vulnerability poses a privacy risk and could be leveraged in multi-stage attacks targeting organizations using Dify for LLM app development.

Potential Impact

The primary impact of this vulnerability is the unauthorized disclosure of registered user email addresses, compromising user privacy and potentially violating data protection regulations. Attackers can leverage this information to craft targeted phishing campaigns, credential stuffing, or social engineering attacks, increasing the risk of account compromise. For organizations, this can lead to reputational damage, loss of customer trust, and potential legal consequences under privacy laws such as GDPR or CCPA. While the vulnerability does not directly allow account takeover or system compromise, it serves as an enabler for more sophisticated attacks. Since Dify is an open-source platform used globally for LLM app development, organizations relying on affected versions may face increased reconnaissance activity. The lack of authentication or user interaction requirements makes exploitation straightforward, increasing the likelihood of automated enumeration attacks at scale.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade all instances of Dify to version 1.9.0 or later, where the issue is resolved. In addition, implement rate limiting and anomaly detection on API endpoints to detect and block enumeration attempts. Employ generic error messages and uniform response codes for authentication and account-related API calls to prevent information leakage. Monitor logs for unusual patterns of email address queries and investigate suspicious activity promptly. Consider adding CAPTCHA or other challenge-response mechanisms on account-related endpoints to deter automated attacks. For organizations deploying Dify in production, conduct regular security assessments and code reviews focusing on information disclosure risks. Finally, educate users about phishing risks and encourage strong, unique passwords alongside multi-factor authentication to reduce the impact of potential follow-on attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-26T01:52:58.735Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a2016632ffcdb8a26f324d

Added to database: 2/27/2026, 8:41:10 PM

Last enriched: 2/27/2026, 8:57:16 PM

Last updated: 2/27/2026, 10:04:14 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses