CVE-2025-43862

7.6 HIGH

📋 TL;DR

CVE-2025-43862 is an access control vulnerability in Dify that allows normal users to access and modify APP orchestration features that should be restricted to administrators. This affects all Dify deployments running versions before 0.6.12. The flaw enables unauthorized changes to application configurations and workflows.

💻 Affected Systems

Products:
  • Dify
Versions: All versions prior to 0.6.12
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all Dify deployments with normal user accounts. The vulnerability exists in the access control logic, not in specific configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious users could reconfigure or disable critical applications, inject malicious workflows, or compromise the integrity of the entire LLM application platform.

🟠

Likely Case

Unauthorized users modifying application configurations, disrupting workflows, or accessing sensitive orchestration data they shouldn't have permissions to view.

🟢

If Mitigated

With proper access controls, only authorized administrators can modify application orchestration, maintaining system integrity and preventing unauthorized changes.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user access but no special privileges. The vulnerability is in the UI access controls, making exploitation straightforward for authenticated users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.6.12

Vendor Advisory: https://github.com/langgenius/dify/security/advisories/GHSA-6pw4-jqhv-3626

Restart Required: Yes

Instructions:

1. Backup your Dify configuration and data. 2. Update Dify to version 0.6.12 or later using your deployment method (Docker, Kubernetes, etc.). 3. Restart the Dify services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Manual Access Control Enhancement

all

Implement stricter role-based access controls to restrict APP orchestration features to admin users only

🧯 If You Can't Patch

  • Implement network segmentation to isolate Dify instances from untrusted networks
  • Review and audit all user accounts, removing unnecessary accounts and implementing strict access controls

🔍 How to Verify

Check if Vulnerable:

Check Dify version. If version is below 0.6.12, the system is vulnerable. Test with a normal user account attempting to access APP orchestration features.

Check Version:

Check the Dify web interface admin panel or deployment configuration for version information

Verify Fix Applied:

After updating to 0.6.12 or later, verify that normal users cannot access APP orchestration features. Test with a normal user account to confirm access is properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to orchestration endpoints by non-admin users
  • Changes to APP configurations from non-admin user accounts

Network Indicators:

  • API calls to orchestration endpoints from non-admin user sessions

SIEM Query:

source="dify" AND (endpoint="orchestration" OR endpoint="app/config") AND user_role!="admin"

🔗 References

📤 Share & Export