A Server-Side Request Forgery (SSRF) vulnerability was identified in langgenius/dify version 0.10.2. The vulnerability occurs in the 'Create Knowledge' section when uploading DOCX files. If an external relationship exists in the DOCX file, the reltype value is requested as a URL using the 'requests' module instead of the 'ssrf_proxy', leading to an SSRF vulnerability. This issue was fixed in version 0.11.0.
History

Tue, 15 Jul 2025 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Langgenius
Langgenius dify
CPEs cpe:2.3:a:langgenius:dify:*:*:*:*:*:node.js:*:*
Vendors & Products Langgenius
Langgenius dify

Thu, 20 Mar 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 20 Mar 2025 10:15:00 +0000

Type Values Removed Values Added
Description A Server-Side Request Forgery (SSRF) vulnerability was identified in langgenius/dify version 0.10.2. The vulnerability occurs in the 'Create Knowledge' section when uploading DOCX files. If an external relationship exists in the DOCX file, the reltype value is requested as a URL using the 'requests' module instead of the 'ssrf_proxy', leading to an SSRF vulnerability. This issue was fixed in version 0.11.0.
Title Server-Side Request Forgery (SSRF) in langgenius/dify
Weaknesses CWE-918
References
Metrics cvssV3_0

{'score': 6.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2025-03-20T10:11:38.385Z

Updated: 2025-03-20T18:05:10.075Z

Reserved: 2025-01-02T23:42:51.957Z

Link: CVE-2025-0184

cve-icon Vulnrichment

Updated: 2025-03-20T18:05:04.196Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-20T10:15:51.173

Modified: 2025-07-15T15:41:34.817

Link: CVE-2025-0184

cve-icon Redhat

No data.