CVE-2026-41947 PUBLISHED

Dify v1.14.1 Authorization Bypass via Trace Configuration Endpoints

Assigner: VulnCheck
Reserved: 22.04.2026 Published: 18.05.2026 Updated: 18.05.2026

Dify version 1.14.1 and prior contains an authorization bypass vulnerability that allows authenticated editor users to set and enable trace configurations for any application regardless of tenant ownership. Attackers can exploit missing tenant ownership checks in the trace configuration endpoints to redirect all messages and responses from victim applications to attacker-controlled LLM trace providers. NOTE: Dify Cloud allows unauthenticated free self-registration, making account creation trivially accessible to any attacker.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 9.1

Product Status

Vendor langgenius
Product dify
Versions Default: affected
  • affected from 0 to 1.14.1 (incl.)

Credits

  • Ido Shani and Gal Zaban of Zafran Security finder

References

Problem Types

  • Authorization Bypass Through User-Controlled Key CWE