Dify is an open-source LLM app development platform. Prior to version 1.11.0, the API key is exposed in plaintext to the frontend, allowing non-administrator users to view and reuse it. This can lead to unauthorized access to third-party services, potentially consuming limited quotas. Version 1.11.0 fixes the issue.
Metrics
Affected Vendors & Products
References
History
Tue, 06 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 06 Jan 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langgenius
Langgenius dify |
|
| Vendors & Products |
Langgenius
Langgenius dify |
Mon, 05 Jan 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dify is an open-source LLM app development platform. Prior to version 1.11.0, the API key is exposed in plaintext to the frontend, allowing non-administrator users to view and reuse it. This can lead to unauthorized access to third-party services, potentially consuming limited quotas. Version 1.11.0 fixes the issue. | |
| Title | Dify Vulnerable to Plaintext API Key Exposure via Model Provider Configuration Endpoint | |
| Weaknesses | CWE-200 CWE-522 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-01-05T21:41:01.583Z
Updated: 2026-01-06T17:39:15.184Z
Reserved: 2025-12-10T20:04:28.290Z
Link: CVE-2025-67732
Updated: 2026-01-06T15:40:52.316Z
Status : Received
Published: 2026-01-05T22:15:51.837
Modified: 2026-01-05T22:15:51.837
Link: CVE-2025-67732
No data.