Dify is an open-source LLM app development platform. In version 1.8.1, a broken access control vulnerability on the /console/api/apps/<APP_ID>chat-messages?conversation_id=<CONVERSATION_ID>&limit=10 endpoint allows users in the same workspace to read chat messages of other users. A regular user is able to read the query data and the filename of the admins and probably other users chats, if they know the conversation_id. This impacts the confidentiality of chats. This issue has been patched in version 1.9.0.
References
| Link | Resource |
|---|---|
| https://github.com/langgenius/dify/commit/b2d8a7eaf1693841411934e2056042845ab4f354 | Patch |
| https://github.com/langgenius/dify/security/advisories/GHSA-jg5j-c9pq-w894 | Vendor Advisory Exploit |
| https://github.com/langgenius/dify/security/advisories/GHSA-jg5j-c9pq-w894 | Vendor Advisory Exploit |
Configurations
History
No history.
Information
Published : 2025-09-25 14:15
Updated : 2025-10-14 14:10
NVD link : CVE-2025-59422
Mitre link : CVE-2025-59422
CVE.ORG link : CVE-2025-59422
JSON object : View
Products Affected
langgenius
- dify
CWE
CWE-284
Improper Access Control
