Home » Database

AVID-2026-R1380

Description

Privilege Escalation in langgenius/dify (CVE-2024-11821)

Details

A privilege escalation vulnerability exists in langgenius/dify version 0.9.1. This vulnerability allows a normal user to modify Orchestrate instructions for a chatbot created by an admin user. The issue arises because the application does not properly enforce access controls on the endpoint /console/api/apps/{chatbot-id}/model-config, allowing unauthorized users to alter chatbot configurations.

Reason for inclusion in AVID: CVE-2024-11821 describes a privilege escalation vulnerability in langgenius/dify, an AI chatbot framework. This affects the AI software stack used to build/deploy AI chatbots (model-config endpoint access control). It is a security vulnerability (unauthorized modification of configurations with low privileges, potential integrity impact) and is evidenced by CVE details, CVSS data, and references. The issue lies in a software component used to run AI systems, aligning with AI-related and GP AI supply chain concerns. Therefore it should be kept for AVID curation.

References

Affected or Relevant Artifacts

  • Developer: langgenius
  • Deployer: langgenius
  • Artifact Details:
TypeName
Systemlanggenius/dify

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Base Score4.3
Base Severity🟠 Medium
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges Required🟢 Low
User InteractionNONE
ScopeUNCHANGED
Confidentiality ImpactNONE
Integrity Impact🟢 Low
Availability ImpactNONE

CWE

IDDescription
CWE-250CWE-250 Execution with Unnecessary Privileges

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2025-03-20
  • Version: 0.3.3
  • AVID Entry