Vulnerability Details CVE-2025-32795
Dify is an open-source LLM app development platform. Prior to version 0.6.12, a vulnerability was identified in the DIFY where normal users are improperly granted permissions to edit APP names, descriptions and icons. This access control flaw allows non-admin users to modify app details, despite being restricted from viewing apps, which poses a security risk to the integrity of the application. This issue has been patched in version 0.6.12. A workaround for this vulnerability involves updating the access control mechanisms to enforce stricter user role permissions and implementing role-based access controls (RBAC) to ensure that only users with admin privileges can modify app details.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 7.7%
CVSS Severity
CVSS v3 Score 6.5
Products affected by CVE-2025-32795
-
cpe:2.3:a:langgenius:dify:0.2.1
-
cpe:2.3:a:langgenius:dify:0.2.2
-
cpe:2.3:a:langgenius:dify:0.3.0
-
cpe:2.3:a:langgenius:dify:0.3.1
-
cpe:2.3:a:langgenius:dify:0.3.10
-
cpe:2.3:a:langgenius:dify:0.3.11
-
cpe:2.3:a:langgenius:dify:0.3.12
-
cpe:2.3:a:langgenius:dify:0.3.13
-
cpe:2.3:a:langgenius:dify:0.3.14
-
cpe:2.3:a:langgenius:dify:0.3.15
-
cpe:2.3:a:langgenius:dify:0.3.16
-
cpe:2.3:a:langgenius:dify:0.3.17
-
cpe:2.3:a:langgenius:dify:0.3.18
-
cpe:2.3:a:langgenius:dify:0.3.19
-
cpe:2.3:a:langgenius:dify:0.3.2
-
cpe:2.3:a:langgenius:dify:0.3.20
-
cpe:2.3:a:langgenius:dify:0.3.21
-
cpe:2.3:a:langgenius:dify:0.3.22
-
cpe:2.3:a:langgenius:dify:0.3.23
-
cpe:2.3:a:langgenius:dify:0.3.24
-
cpe:2.3:a:langgenius:dify:0.3.25
-
cpe:2.3:a:langgenius:dify:0.3.26
-
cpe:2.3:a:langgenius:dify:0.3.27
-
cpe:2.3:a:langgenius:dify:0.3.28
-
cpe:2.3:a:langgenius:dify:0.3.29
-
cpe:2.3:a:langgenius:dify:0.3.3
-
cpe:2.3:a:langgenius:dify:0.3.30
-
cpe:2.3:a:langgenius:dify:0.3.31
-
cpe:2.3:a:langgenius:dify:0.3.32
-
cpe:2.3:a:langgenius:dify:0.3.33
-
cpe:2.3:a:langgenius:dify:0.3.34
-
cpe:2.3:a:langgenius:dify:0.3.4
-
cpe:2.3:a:langgenius:dify:0.3.5
-
cpe:2.3:a:langgenius:dify:0.3.6
-
cpe:2.3:a:langgenius:dify:0.3.7
-
cpe:2.3:a:langgenius:dify:0.3.8
-
cpe:2.3:a:langgenius:dify:0.3.9
-
cpe:2.3:a:langgenius:dify:0.4.0
-
cpe:2.3:a:langgenius:dify:0.4.1
-
cpe:2.3:a:langgenius:dify:0.4.2
-
cpe:2.3:a:langgenius:dify:0.4.3
-
cpe:2.3:a:langgenius:dify:0.4.4
-
cpe:2.3:a:langgenius:dify:0.4.5
-
cpe:2.3:a:langgenius:dify:0.4.6
-
cpe:2.3:a:langgenius:dify:0.4.7
-
cpe:2.3:a:langgenius:dify:0.4.8
-
cpe:2.3:a:langgenius:dify:0.4.9
-
cpe:2.3:a:langgenius:dify:0.5.0
-
cpe:2.3:a:langgenius:dify:0.5.1
-
cpe:2.3:a:langgenius:dify:0.5.10
-
cpe:2.3:a:langgenius:dify:0.5.11
-
cpe:2.3:a:langgenius:dify:0.5.2
-
cpe:2.3:a:langgenius:dify:0.5.3
-
cpe:2.3:a:langgenius:dify:0.5.4
-
cpe:2.3:a:langgenius:dify:0.5.5
-
cpe:2.3:a:langgenius:dify:0.5.6
-
cpe:2.3:a:langgenius:dify:0.5.7
-
cpe:2.3:a:langgenius:dify:0.5.8
-
cpe:2.3:a:langgenius:dify:0.5.9
-
cpe:2.3:a:langgenius:dify:0.6.0
-
cpe:2.3:a:langgenius:dify:0.6.1
-
cpe:2.3:a:langgenius:dify:0.6.10
-
cpe:2.3:a:langgenius:dify:0.6.11
-
cpe:2.3:a:langgenius:dify:0.6.2
-
cpe:2.3:a:langgenius:dify:0.6.3
-
cpe:2.3:a:langgenius:dify:0.6.4
-
cpe:2.3:a:langgenius:dify:0.6.5
-
cpe:2.3:a:langgenius:dify:0.6.6
-
cpe:2.3:a:langgenius:dify:0.6.7
-
cpe:2.3:a:langgenius:dify:0.6.8
-
cpe:2.3:a:langgenius:dify:0.6.9