First published: Thu Mar 20 2025(Updated: )
A Server-Side Request Forgery (SSRF) vulnerability was identified in langgenius/dify version 0.10.2. The vulnerability occurs in the 'Create Knowledge' section when uploading DOCX files. If an external relationship exists in the DOCX file, the reltype value is requested as a URL using the 'requests' module instead of the 'ssrf_proxy', leading to an SSRF vulnerability. This issue was fixed in version 0.11.0.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Dify | <0.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0184 is categorized as a medium severity Server-Side Request Forgery (SSRF) vulnerability.
To fix CVE-2025-0184, upgrade langgenius/dify to version 0.11.0 or later.
Versions of langgenius/dify prior to 0.11.0 are affected by CVE-2025-0184.
CVE-2025-0184 is a Server-Side Request Forgery (SSRF) vulnerability.
CVE-2025-0184 occurs in the 'Create Knowledge' section when uploading DOCX files.