A Server-Side Request Forgery (SSRF) vulnerability was identified in langgenius/dify version 0.10.2. The vulnerability occurs in the 'Create Knowledge' section when uploading DOCX files. If an external relationship exists in the DOCX file, the reltype value is requested as a URL using the 'requests' module instead of the 'ssrf_proxy', leading to an SSRF vulnerability. This issue was fixed in version 0.11.0.
Metrics
Affected Vendors & Products
References
History
Tue, 15 Jul 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Langgenius
Langgenius dify |
|
CPEs | cpe:2.3:a:langgenius:dify:*:*:*:*:*:node.js:*:* | |
Vendors & Products |
Langgenius
Langgenius dify |
Thu, 20 Mar 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Server-Side Request Forgery (SSRF) vulnerability was identified in langgenius/dify version 0.10.2. The vulnerability occurs in the 'Create Knowledge' section when uploading DOCX files. If an external relationship exists in the DOCX file, the reltype value is requested as a URL using the 'requests' module instead of the 'ssrf_proxy', leading to an SSRF vulnerability. This issue was fixed in version 0.11.0. | |
Title | Server-Side Request Forgery (SSRF) in langgenius/dify | |
Weaknesses | CWE-918 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:11:38.385Z
Updated: 2025-03-20T18:05:10.075Z
Reserved: 2025-01-02T23:42:51.957Z
Link: CVE-2025-0184

Updated: 2025-03-20T18:05:04.196Z

Status : Analyzed
Published: 2025-03-20T10:15:51.173
Modified: 2025-07-15T15:41:34.817
Link: CVE-2025-0184

No data.