CVE-2026-28288: CWE-204: Observable Response Discrepancy in langgenius dify
CVE-2026-28288 is a medium-severity vulnerability in the open-source LLM app development platform Dify (versions prior to 1. 9. 0). The issue arises from observable response discrepancies in the Dify API when queried with existing versus non-existent email accounts. This behavior allows attackers to enumerate registered email addresses without authentication or user interaction. The vulnerability is classified under CWE-204 (Observable Response Discrepancy). Although no known exploits are currently in the wild, the flaw can lead to privacy violations and facilitate further targeted attacks such as phishing. The vulnerability has a CVSS 4. 0 base score of 5. 5, reflecting its moderate impact and ease of exploitation over the network.
AI Analysis
Technical Summary
CVE-2026-28288 identifies an information disclosure vulnerability in the Dify platform, an open-source tool for developing applications using large language models (LLMs). Prior to version 1.9.0, the Dify API responses differ noticeably when queried with email addresses associated with existing accounts compared to those that do not exist. This discrepancy enables an unauthenticated remote attacker to perform user enumeration attacks by systematically testing email addresses and observing the API's differing responses. The vulnerability is categorized under CWE-204, which involves observable response discrepancies that leak information about system state or data. The CVSS 4.0 vector indicates the attack requires no privileges, no user interaction, and can be executed remotely over the network with low complexity. The impact is limited to confidentiality as it leaks information about registered users, potentially aiding social engineering or brute force attacks. The vendor addressed this issue in Dify version 1.9.0 by standardizing API responses to prevent enumeration. No public exploits have been reported yet, but the vulnerability poses a privacy risk and could be leveraged in multi-stage attacks targeting organizations using Dify for LLM app development.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of registered user email addresses, compromising user privacy and potentially violating data protection regulations. Attackers can leverage this information to craft targeted phishing campaigns, credential stuffing, or social engineering attacks, increasing the risk of account compromise. For organizations, this can lead to reputational damage, loss of customer trust, and potential legal consequences under privacy laws such as GDPR or CCPA. While the vulnerability does not directly allow account takeover or system compromise, it serves as an enabler for more sophisticated attacks. Since Dify is an open-source platform used globally for LLM app development, organizations relying on affected versions may face increased reconnaissance activity. The lack of authentication or user interaction requirements makes exploitation straightforward, increasing the likelihood of automated enumeration attacks at scale.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade all instances of Dify to version 1.9.0 or later, where the issue is resolved. In addition, implement rate limiting and anomaly detection on API endpoints to detect and block enumeration attempts. Employ generic error messages and uniform response codes for authentication and account-related API calls to prevent information leakage. Monitor logs for unusual patterns of email address queries and investigate suspicious activity promptly. Consider adding CAPTCHA or other challenge-response mechanisms on account-related endpoints to deter automated attacks. For organizations deploying Dify in production, conduct regular security assessments and code reviews focusing on information disclosure risks. Finally, educate users about phishing risks and encourage strong, unique passwords alongside multi-factor authentication to reduce the impact of potential follow-on attacks.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, South Korea, India, Netherlands
CVE-2026-28288: CWE-204: Observable Response Discrepancy in langgenius dify
Description
CVE-2026-28288 is a medium-severity vulnerability in the open-source LLM app development platform Dify (versions prior to 1. 9. 0). The issue arises from observable response discrepancies in the Dify API when queried with existing versus non-existent email accounts. This behavior allows attackers to enumerate registered email addresses without authentication or user interaction. The vulnerability is classified under CWE-204 (Observable Response Discrepancy). Although no known exploits are currently in the wild, the flaw can lead to privacy violations and facilitate further targeted attacks such as phishing. The vulnerability has a CVSS 4. 0 base score of 5. 5, reflecting its moderate impact and ease of exploitation over the network.
AI-Powered Analysis
Technical Analysis
CVE-2026-28288 identifies an information disclosure vulnerability in the Dify platform, an open-source tool for developing applications using large language models (LLMs). Prior to version 1.9.0, the Dify API responses differ noticeably when queried with email addresses associated with existing accounts compared to those that do not exist. This discrepancy enables an unauthenticated remote attacker to perform user enumeration attacks by systematically testing email addresses and observing the API's differing responses. The vulnerability is categorized under CWE-204, which involves observable response discrepancies that leak information about system state or data. The CVSS 4.0 vector indicates the attack requires no privileges, no user interaction, and can be executed remotely over the network with low complexity. The impact is limited to confidentiality as it leaks information about registered users, potentially aiding social engineering or brute force attacks. The vendor addressed this issue in Dify version 1.9.0 by standardizing API responses to prevent enumeration. No public exploits have been reported yet, but the vulnerability poses a privacy risk and could be leveraged in multi-stage attacks targeting organizations using Dify for LLM app development.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of registered user email addresses, compromising user privacy and potentially violating data protection regulations. Attackers can leverage this information to craft targeted phishing campaigns, credential stuffing, or social engineering attacks, increasing the risk of account compromise. For organizations, this can lead to reputational damage, loss of customer trust, and potential legal consequences under privacy laws such as GDPR or CCPA. While the vulnerability does not directly allow account takeover or system compromise, it serves as an enabler for more sophisticated attacks. Since Dify is an open-source platform used globally for LLM app development, organizations relying on affected versions may face increased reconnaissance activity. The lack of authentication or user interaction requirements makes exploitation straightforward, increasing the likelihood of automated enumeration attacks at scale.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade all instances of Dify to version 1.9.0 or later, where the issue is resolved. In addition, implement rate limiting and anomaly detection on API endpoints to detect and block enumeration attempts. Employ generic error messages and uniform response codes for authentication and account-related API calls to prevent information leakage. Monitor logs for unusual patterns of email address queries and investigate suspicious activity promptly. Consider adding CAPTCHA or other challenge-response mechanisms on account-related endpoints to deter automated attacks. For organizations deploying Dify in production, conduct regular security assessments and code reviews focusing on information disclosure risks. Finally, educate users about phishing risks and encourage strong, unique passwords alongside multi-factor authentication to reduce the impact of potential follow-on attacks.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-26T01:52:58.735Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a2016632ffcdb8a26f324d
Added to database: 2/27/2026, 8:41:10 PM
Last enriched: 2/27/2026, 8:57:16 PM
Last updated: 2/27/2026, 10:04:14 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28414: CWE-36: Absolute Path Traversal in gradio-app gradio
HighCVE-2026-27939: CWE-287: Improper Authentication in statamic cms
HighCVE-2026-28416: CWE-918: Server-Side Request Forgery (SSRF) in gradio-app gradio
HighCVE-2026-28415: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in gradio-app gradio
MediumCVE-2026-28411: CWE-288: Authentication Bypass Using an Alternate Path or Channel in LabRedesCefetRJ WeGIA
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.