CVE-2025-3466
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-07

Last updated on: 2025-07-10

Assigner: huntr.dev

Description
langgenius/dify versions 1.1.0 to 1.1.2 are vulnerable to unsanitized input in the code node, allowing execution of arbitrary code with full root permissions. The vulnerability arises from the ability to override global functions in JavaScript, such as parseInt, before sandbox security restrictions are imposed. This can lead to unauthorized access to secret keys, internal network servers, and lateral movement within dify.ai. The issue is resolved in version 1.1.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-07
Last Modified
2025-07-10
Generated
2026-05-07
AI Q&A
2025-07-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
langgenius dify From 1.1.0 (inc) to 1.1.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1100 The product or code does not isolate system-dependent functionality into separate standalone modules.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects langgenius/dify versions 1.1.0 to 1.1.2 and involves unsanitized input in the code node, which allows an attacker to execute arbitrary code with full root permissions. The root cause is that global JavaScript functions like parseInt can be overridden before sandbox security restrictions are applied. This flaw enables unauthorized access to secret keys, internal network servers, and allows lateral movement within dify.ai. The issue is fixed in version 1.1.3.


How can this vulnerability impact me? :

The vulnerability can have severe impacts including unauthorized execution of arbitrary code with root privileges, leading to full system compromise. Attackers can gain access to secret keys, internal network servers, and move laterally within the affected environment, potentially causing data breaches, service disruption, and loss of control over the system.


What immediate steps should I take to mitigate this vulnerability?

Upgrade langgenius/dify to version 1.1.3 or later, as this version contains the fix for the vulnerability that allows arbitrary code execution via unsanitized input in the code node. Avoid using versions 1.1.0 to 1.1.2, which are vulnerable.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart