CVE-2025-63387

Published Dec 18, 2025

Last updated 21 days ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-63387 affects Dify v1.9.1 due to insecure permissions. An unauthenticated attacker can send HTTP GET requests directly to the `/console/api/system-features` endpoint without needing authentication credentials or session tokens. The vulnerability exists because the endpoint doesn't have proper authorization checks. This allows anonymous access to sensitive system configuration data.

Description
Dify v1.9.1 is vulnerable to Insecure Permissions. An unauthenticated attacker can directly send HTTP GET requests to the /console/api/system-features endpoint without any authentication credentials or session tokens. The endpoint fails to implement proper authorization checks, allowing anonymous access to sensitive system configuration data. NOTE: The maintainer states that the endpoint is unauthenticated by design and serves as a bootstrap mechanism required for the dashboard initialization. They also state that the description inaccurately classifies the returned data as sensitive system configuration, stating that the data is non-sensitive and required for client-side rendering. No PII, credentials, or secrets are exposed.
Source
cve@mitre.org
NVD status
Modified
CNA Tags
disputed
Products
dify

Risk scores

CVSS 3.1

Type
Secondary
Base score
7.5
Impact score
3.6
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Severity
HIGH

Weaknesses

134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-284

Social media

Hype score
Not currently trending

Configurations