CVE-2025-3466
BaseFortify
Publication date: 2025-07-07
Last updated on: 2025-07-10
Assigner: huntr.dev
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| langgenius | dify | From 1.1.0 (inc) to 1.1.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1100 | The product or code does not isolate system-dependent functionality into separate standalone modules. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects langgenius/dify versions 1.1.0 to 1.1.2 and involves unsanitized input in the code node, which allows an attacker to execute arbitrary code with full root permissions. The root cause is that global JavaScript functions like parseInt can be overridden before sandbox security restrictions are applied. This flaw enables unauthorized access to secret keys, internal network servers, and allows lateral movement within dify.ai. The issue is fixed in version 1.1.3.
How can this vulnerability impact me? :
The vulnerability can have severe impacts including unauthorized execution of arbitrary code with root privileges, leading to full system compromise. Attackers can gain access to secret keys, internal network servers, and move laterally within the affected environment, potentially causing data breaches, service disruption, and loss of control over the system.
What immediate steps should I take to mitigate this vulnerability?
Upgrade langgenius/dify to version 1.1.3 or later, as this version contains the fix for the vulnerability that allows arbitrary code execution via unsanitized input in the code node. Avoid using versions 1.1.0 to 1.1.2, which are vulnerable.