langgenius/dify version v0.10.1 contains a vulnerability where there are no limits applied to the number of code guess attempts for password reset. This allows an unauthenticated attacker to reset owner, admin, or other user passwords within a few hours by guessing the six-digit code, resulting in a complete compromise of the application.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langgenius
Langgenius dify |
|
| CPEs | cpe:2.3:a:langgenius:dify:0.10.1:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Langgenius
Langgenius dify |
|
| Metrics |
cvssV3_1
|
Thu, 20 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | langgenius/dify version v0.10.1 contains a vulnerability where there are no limits applied to the number of code guess attempts for password reset. This allows an unauthenticated attacker to reset owner, admin, or other user passwords within a few hours by guessing the six-digit code, resulting in a complete compromise of the application. | |
| Title | Improper Restriction of Excessive Authentication Attempts in langgenius/dify | |
| Weaknesses | CWE-307 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:09:33.467Z
Updated: 2025-03-20T18:37:39.974Z
Reserved: 2024-12-02T17:04:27.890Z
Link: CVE-2024-12039
Updated: 2025-03-20T17:50:28.239Z
Status : Analyzed
Published: 2025-03-20T10:15:26.270
Modified: 2025-07-15T15:59:02.880
Link: CVE-2024-12039
No data.