langgenius/dify version v0.10.1 contains a vulnerability where there are no limits applied to the number of code guess attempts for password reset. This allows an unauthenticated attacker to reset owner, admin, or other user passwords within a few hours by guessing the six-digit code, resulting in a complete compromise of the application.
Metrics
Affected Vendors & Products
References
History
Thu, 20 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | langgenius/dify version v0.10.1 contains a vulnerability where there are no limits applied to the number of code guess attempts for password reset. This allows an unauthenticated attacker to reset owner, admin, or other user passwords within a few hours by guessing the six-digit code, resulting in a complete compromise of the application. | |
Title | Improper Restriction of Excessive Authentication Attempts in langgenius/dify | |
Weaknesses | CWE-307 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-03-20T18:37:39.974Z
Reserved: 2024-12-02T17:04:27.890Z
Link: CVE-2024-12039

Updated: 2025-03-20T17:50:28.239Z

Status : Received
Published: 2025-03-20T10:15:26.270
Modified: 2025-03-20T10:15:26.270
Link: CVE-2024-12039

No data.