Логотип exploitDog
bind:CVE-2025-3466
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-3466

Количество 3

Количество 3

nvd логотип

CVE-2025-3466

7 месяцев назад

langgenius/dify versions 1.1.0 to 1.1.2 are vulnerable to unsanitized input in the code node, allowing execution of arbitrary code with full root permissions. The vulnerability arises from the ability to override global functions in JavaScript, such as parseInt, before sandbox security restrictions are imposed. This can lead to unauthorized access to secret keys, internal network servers, and lateral movement within dify.ai. The issue is resolved in version 1.1.3.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-x53g-q9xm-rf4m

7 месяцев назад

langgenius/dify versions 1.1.0 to 1.1.2 are vulnerable to unsanitized input in the code node, allowing execution of arbitrary code with full root permissions. The vulnerability arises from the ability to override global functions in JavaScript, such as parseInt, before sandbox security restrictions are imposed. This can lead to unauthorized access to secret keys, internal network servers, and lateral movement within dify.ai. The issue is resolved in version 1.1.3.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2026-00211

11 месяцев назад

Уязвимость функции parseInt() платформы для разработки приложений dify.ai, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-3466

langgenius/dify versions 1.1.0 to 1.1.2 are vulnerable to unsanitized input in the code node, allowing execution of arbitrary code with full root permissions. The vulnerability arises from the ability to override global functions in JavaScript, such as parseInt, before sandbox security restrictions are imposed. This can lead to unauthorized access to secret keys, internal network servers, and lateral movement within dify.ai. The issue is resolved in version 1.1.3.

CVSS3: 7.2
0%
Низкий
7 месяцев назад
github логотип
GHSA-x53g-q9xm-rf4m

langgenius/dify versions 1.1.0 to 1.1.2 are vulnerable to unsanitized input in the code node, allowing execution of arbitrary code with full root permissions. The vulnerability arises from the ability to override global functions in JavaScript, such as parseInt, before sandbox security restrictions are imposed. This can lead to unauthorized access to secret keys, internal network servers, and lateral movement within dify.ai. The issue is resolved in version 1.1.3.

CVSS3: 9.8
0%
Низкий
7 месяцев назад
fstec логотип
BDU:2026-00211

Уязвимость функции parseInt() платформы для разработки приложений dify.ai, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 9.8
0%
Низкий
11 месяцев назад

Уязвимостей на страницу