CVE-2025-63387
HIGH EXPLOITED NUCLEIDify v1.9.1 - Info Disclosure
Title source: llmDescription
Dify v1.9.1 is vulnerable to Insecure Permissions. An unauthenticated attacker can directly send HTTP GET requests to the /console/api/system-features endpoint without any authentication credentials or session tokens. The endpoint fails to implement proper authorization checks, allowing anonymous access to sensitive system configuration data. NOTE: The maintainer states that the endpoint is unauthenticated by design and serves as a bootstrap mechanism required for the dashboard initialization. They also state that the description inaccurately classifies the returned data as sensitive system configuration, stating that the data is non-sensitive and required for client-side rendering. No PII, credentials, or secrets are exposed.
Nuclei Templates (1)
Dify v1.9.1 - Broken Access Control
MEDIUMVERIFIEDby DhiyaneshDK
FOFA:
app="Dify"
References (6)
Scores
CVSS v3
7.5
EPSS
0.0808
EPSS Percentile
92.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2026-01-14
CWE
CWE-284
Status
published
Products (1)
langgenius/dify
1.9.1
Published
Dec 18, 2025
Tracked Since
Feb 18, 2026