langgenius/dify version v0.10.1 contains a vulnerability where there are no limits applied to the number of code guess attempts for password reset. This allows an unauthenticated attacker to reset owner, admin, or other user passwords within a few hours by guessing the six-digit code, resulting in a complete compromise of the application.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00047}

epss

{'score': 0.00114}


Tue, 15 Jul 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Langgenius
Langgenius dify
CPEs cpe:2.3:a:langgenius:dify:0.10.1:*:*:*:*:node.js:*:*
Vendors & Products Langgenius
Langgenius dify
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 20 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 20 Mar 2025 10:15:00 +0000

Type Values Removed Values Added
Description langgenius/dify version v0.10.1 contains a vulnerability where there are no limits applied to the number of code guess attempts for password reset. This allows an unauthenticated attacker to reset owner, admin, or other user passwords within a few hours by guessing the six-digit code, resulting in a complete compromise of the application.
Title Improper Restriction of Excessive Authentication Attempts in langgenius/dify
Weaknesses CWE-307
References
Metrics cvssV3_0

{'score': 7.4, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2025-03-20T10:09:33.467Z

Updated: 2025-03-20T18:37:39.974Z

Reserved: 2024-12-02T17:04:27.890Z

Link: CVE-2024-12039

cve-icon Vulnrichment

Updated: 2025-03-20T17:50:28.239Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-20T10:15:26.270

Modified: 2025-07-15T15:59:02.880

Link: CVE-2024-12039

cve-icon Redhat

No data.