Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2026-41949— Dify v1.14.1 Authorization Bypass via File Preview Endpoint

CVSS 5.9 · Medium EPSS 0.03% · P8

Affected Version Matrix 1

VendorProductVersion RangeStatus
langgeniusdify≤ 1.14.1affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-41949

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Dify v1.14.1 Authorization Bypass via File Preview Endpoint
Source: NVD (National Vulnerability Database)
Vulnerability Description
Dify version 1.14.1 and prior contain an authorization bypass vulnerability in the file preview endpoint that allows any authenticated user to read up to 3,000 characters of any uploaded document across all tenants and workspaces using only the file's UUID. Attackers can access the /console/api/files/{file_id}/preview endpoint with an intercepted file UUID to extract sensitive content from documents without ownership or workspace permission verification. NOTE: Dify Cloud allows unauthenticated free self-registration, making account creation trivially accessible to any attacker.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
通过用户控制密钥绕过授权机制
Source: NVD (National Vulnerability Database)
Vulnerability Title
dify 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
dify是LangGenius开源的一个 LLM 应用程序开发平台。 dify 1.14.1及之前版本存在安全漏洞,该漏洞源于文件预览端点中的授权绕过问题,可能导致任何认证用户使用文件UUID读取跨所有租户和工作空间的任何上传文档的前3000个字符。攻击者可以访问/console/api/files/{file_id}/preview端点,使用拦截的文件UUID提取文档中的敏感内容。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
langgeniusdify 0 ~ 1.14.1 -

II. Public POCs for CVE-2026-41949

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-41949

登录查看更多情报信息。
Advisory · 2Patch · 1

Same Patch Batch · langgenius · 2026-05-18 · 3 CVEs total

CVE-2026-419487.7 HIGHDify v1.14.1 Path Traversal via Plugin Daemon Internal API Access
CVE-2026-419477.4 HIGHDify v1.14.1 Authorization Bypass via Trace Configuration Endpoints

IV. Related Vulnerabilities

V. Comments for CVE-2026-41949

No comments yet


Leave a comment