In langgenius/dify v0.10.1, the `/forgot-password/resets` endpoint does not verify the password reset code, allowing an attacker to reset the password of any user, including administrators. This vulnerability can lead to a complete compromise of the application.
Metrics
Affected Vendors & Products
References
History
Mon, 14 Jul 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langgenius
Langgenius dify |
|
| CPEs | cpe:2.3:a:langgenius:dify:0.10.1:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Langgenius
Langgenius dify |
Thu, 20 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In langgenius/dify v0.10.1, the `/forgot-password/resets` endpoint does not verify the password reset code, allowing an attacker to reset the password of any user, including administrators. This vulnerability can lead to a complete compromise of the application. | |
| Title | Authentication Bypass in langgenius/dify | |
| Weaknesses | CWE-305 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:10:42.717Z
Updated: 2025-03-20T18:18:01.777Z
Reserved: 2024-12-18T22:10:57.059Z
Link: CVE-2024-12776
Updated: 2025-03-20T17:49:33.301Z
Status : Analyzed
Published: 2025-03-20T10:15:30.233
Modified: 2025-07-14T18:18:36.013
Link: CVE-2024-12776
No data.