A Server-Side Request Forgery (SSRF) vulnerability was identified in langgenius/dify version 0.10.2. The vulnerability occurs in the 'Create Knowledge' section when uploading DOCX files. If an external relationship exists in the DOCX file, the reltype value is requested as a URL using the 'requests' module instead of the 'ssrf_proxy', leading to an SSRF vulnerability. This issue was fixed in version 0.11.0.
Metrics
Affected Vendors & Products
References
History
Tue, 15 Jul 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langgenius
Langgenius dify |
|
| CPEs | cpe:2.3:a:langgenius:dify:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Langgenius
Langgenius dify |
Thu, 20 Mar 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Server-Side Request Forgery (SSRF) vulnerability was identified in langgenius/dify version 0.10.2. The vulnerability occurs in the 'Create Knowledge' section when uploading DOCX files. If an external relationship exists in the DOCX file, the reltype value is requested as a URL using the 'requests' module instead of the 'ssrf_proxy', leading to an SSRF vulnerability. This issue was fixed in version 0.11.0. | |
| Title | Server-Side Request Forgery (SSRF) in langgenius/dify | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:11:38.385Z
Updated: 2025-03-20T18:05:10.075Z
Reserved: 2025-01-02T23:42:51.957Z
Link: CVE-2025-0184
Updated: 2025-03-20T18:05:04.196Z
Status : Analyzed
Published: 2025-03-20T10:15:51.173
Modified: 2025-07-15T15:41:34.817
Link: CVE-2025-0184
No data.