Dify before version 1.14.0 contains an authorization bypass vulnerability that allows authenticated users to read the full contents of files uploaded by other users within the same tenant by supplying an arbitrary file UUID in the files array of a chat-messages request. Attackers can exploit insufficient permission verification in the chat-messages endpoints to access files without ownership validation, bypassing workspace separation and signed URL protections to retrieve sensitive file contents through workflow processing.
Metrics
Affected Vendors & Products
References
History
Tue, 05 May 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dify before version 1.14.0 contains an authorization bypass vulnerability that allows authenticated users to read the full contents of files uploaded by other users within the same tenant by supplying an arbitrary file UUID in the files array of a chat-messages request. Attackers can exploit insufficient permission verification in the chat-messages endpoints to access files without ownership validation, bypassing workspace separation and signed URL protections to retrieve sensitive file contents through workflow processing. | |
| Title | Dify < 1.14.0 Authorization Bypass via File UUID | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-05T20:35:56.073Z
Reserved: 2026-04-22T18:50:43.622Z
Link: CVE-2026-41950
No data.
Status : Received
Published: 2026-05-05T21:16:23.233
Modified: 2026-05-05T21:16:23.233
Link: CVE-2026-41950
No data.
OpenCVE Enrichment
Updated: 2026-05-05T22:30:33Z