Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-41948: Relative Path Traversal in langgenius dify

0
Critical
VulnerabilityCVE-2026-41948cvecve-2026-41948
Published: Mon May 18 2026 (05/18/2026, 13:50:21 UTC)
Source: CVE Database V5
Vendor/Project: langgenius
Product: dify

Description

Dify version 1.14.1 and prior contain a path traversal vulnerability that allows authenticated users to manipulate requests forwarded to the Plugin Daemon's internal REST API by exploiting insufficient URL path sanitization. Attackers can traverse out of their authorized tenant path using unencoded dot sequences in task identifiers or manipulated filename parameters to access internal endpoints such as debug interfaces, requiring only knowledge of the victim tenant's UUID. NOTE: Dify Cloud allows unauthenticated free self-registration, making account creation trivially accessible to any attacker.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/18/2026, 14:36:52 UTC

Technical Analysis

CVE-2026-41948 is a path traversal vulnerability in langgenius's Dify product (version 1.14.1 and prior) where authenticated users can bypass tenant path restrictions by sending specially crafted requests with unencoded dot sequences in task identifiers or manipulated filename parameters. This exploits insufficient sanitization of URL paths forwarded to the Plugin Daemon's internal REST API, enabling access to internal endpoints such as debug interfaces. The attack requires knowledge of the tenant UUID. The vulnerability is rated critical with a CVSS 4.0 score of 9.2. No official patch or remediation level has been published, and the product is not a cloud service.

Potential Impact

Successful exploitation allows attackers to traverse outside their authorized tenant directory and access internal API endpoints, potentially exposing sensitive internal interfaces like debug endpoints. This could lead to unauthorized information disclosure or further attacks within the affected system. The vulnerability requires authenticated access and tenant UUID knowledge, but the ease of account creation on Dify Cloud increases the risk of exploitation.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, restrict access to the Plugin Daemon's internal REST API and monitor for suspicious use of path traversal patterns. Consider disabling or restricting debug interfaces if possible. Since Dify Cloud allows free self-registration, implement additional tenant verification or monitoring to detect abuse.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-04-22T18:50:43.622Z
Cvss Version
4.0
State
PUBLISHED
Remediation Level
null

Threat ID: 6a0b2098ec166c07b0c6944d

Added to database: 5/18/2026, 2:22:16 PM

Last enriched: 5/18/2026, 2:36:52 PM

Last updated: 5/20/2026, 7:21:06 PM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses