langgenius/dify versions 1.1.0 to 1.1.2 are vulnerable to unsanitized input in the code node, allowing execution of arbitrary code with full root permissions. The vulnerability arises from the ability to override global functions in JavaScript, such as parseInt, before sandbox security restrictions are imposed. This can lead to unauthorized access to secret keys, internal network servers, and lateral movement within dify.ai. The issue is resolved in version 1.1.3.
History

Mon, 07 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 07 Jul 2025 10:00:00 +0000

Type Values Removed Values Added
Description langgenius/dify versions 1.1.0 to 1.1.2 are vulnerable to unsanitized input in the code node, allowing execution of arbitrary code with full root permissions. The vulnerability arises from the ability to override global functions in JavaScript, such as parseInt, before sandbox security restrictions are imposed. This can lead to unauthorized access to secret keys, internal network servers, and lateral movement within dify.ai. The issue is resolved in version 1.1.3.
Title Unsanitized Input in langgenius/dify
Weaknesses CWE-1100
References
Metrics cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2025-07-07T09:55:28.608Z

Updated: 2025-07-07T14:21:49.892Z

Reserved: 2025-04-09T11:35:16.408Z

Link: CVE-2025-3466

cve-icon Vulnrichment

Updated: 2025-07-07T14:17:06.888Z

cve-icon NVD

Status : Received

Published: 2025-07-07T10:15:27.640

Modified: 2025-07-07T10:15:27.640

Link: CVE-2025-3466

cve-icon Redhat

No data.