First published: Thu Mar 20 2025(Updated: )
A stored cross-site scripting (XSS) vulnerability exists in the latest version of langgenius/dify. The vulnerability is due to improper validation and sanitization of user input in SVG markdown support within the chatbot feature. An attacker can exploit this vulnerability by injecting malicious SVG content, which can execute arbitrary JavaScript code when viewed by an admin, potentially leading to credential theft.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Dify |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11850 is considered a high severity vulnerability due to its potential for stored cross-site scripting attacks.
To fix CVE-2024-11850, ensure proper validation and sanitization of user input when using SVG markdown support in the chatbot feature.
CVE-2024-11850 can lead to the execution of arbitrary scripts in the user's browser, compromising their data and session.
CVE-2024-11850 affects users of the Langgenius dify application that utilizes the chatbot feature with SVG markdown support.
Attackers can exploit CVE-2024-11850 by injecting malicious scripts into the chatbot, which are subsequently rendered in the browser of other users.