Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2025-1796

A vulnerability in langgenius/dify v0.10.1 allows an attacker to take over any account, including administrator accounts, by exploiting a weak pseudo-random number generator (PRNG) used for generating password reset codes. The application uses `random.randint` for this purpose, which is not suitable for cryptographic use and can be cracked. An attacker with access to workflow tools can extract the PRNG output and predict future password reset codes, leading to a complete compromise of the application.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 15.3%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2025-1796
  • Langgenius » Dify » Version: 0.10.1
    cpe:2.3:a:langgenius:dify:0.10.1


Contact Us

Shodan ® - All rights reserved