CVE-2026-41949
Authorization Bypass in Dify File Preview Endpoint
Publication date: 2026-05-18
Last updated on: 2026-05-19
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dify | dify | to 1.14.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-639 | The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-41949 is an authorization bypass vulnerability in Dify version 1.14.1 and earlier. It exists in the file preview endpoint, where any authenticated user can read up to 3,000 characters of any uploaded document across all tenants and workspaces by using only the file's UUID.
The vulnerability allows attackers to access the /console/api/files/{file_id}/preview endpoint with an intercepted file UUID to extract sensitive content from documents without verifying ownership or workspace permissions.
Additionally, because Dify Cloud allows unauthenticated free self-registration, attackers can easily create accounts to exploit this flaw.
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized disclosure of sensitive information contained in uploaded documents across different tenants and workspaces.
Attackers who gain access to file UUIDs can read portions of documents (up to 3,000 characters) without having proper permissions, potentially exposing confidential or private data.
Since account creation is trivial due to free self-registration, attackers can easily create accounts to exploit this vulnerability, increasing the risk of data leakage.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring access to the file preview endpoint, specifically requests to /console/api/files/{file_id}/preview where {file_id} is a UUID of uploaded documents.
Suspicious activity includes authenticated users accessing file previews for files they do not own or belong to their workspace or tenant.
To detect exploitation attempts, you can analyze web server logs or API access logs for unusual or unauthorized access patterns to the preview endpoint.
- Use network monitoring tools or log analysis commands such as: grep '/console/api/files/' /var/log/nginx/access.log | grep preview
- Check for requests from authenticated users accessing file UUIDs outside their tenant or workspace.
- Use API request tracing or auditing features to correlate user identities with accessed file UUIDs.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade Dify to version 1.14.2 or later, where the vulnerability has been fixed by enforcing tenant scoping in the file preview endpoint.
The fix includes modifying the file preview service to verify tenant ownership and updating the API controller to pass the caller's tenant ID, preventing unauthorized access.
Until the upgrade is applied, restrict access to the /console/api/files/{file_id}/preview endpoint to trusted users only and monitor for suspicious access.
Consider disabling unauthenticated self-registration if possible to reduce the risk of attacker account creation.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthorized access to sensitive document content across tenants and workspaces by bypassing authorization controls. This unauthorized data exposure could lead to violations of data protection regulations such as GDPR and HIPAA, which require strict access controls and protection of personal and sensitive information.
Because attackers can read up to 3,000 characters of any uploaded document without proper permission verification, organizations using affected versions of Dify may fail to meet compliance requirements related to confidentiality, data minimization, and access control.