In langgenius/dify v0.10.1, the `/forgot-password/resets` endpoint does not verify the password reset code, allowing an attacker to reset the password of any user, including administrators. This vulnerability can lead to a complete compromise of the application.
Metrics
Affected Vendors & Products
References
History
Thu, 20 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In langgenius/dify v0.10.1, the `/forgot-password/resets` endpoint does not verify the password reset code, allowing an attacker to reset the password of any user, including administrators. This vulnerability can lead to a complete compromise of the application. | |
Title | Authentication Bypass in langgenius/dify | |
Weaknesses | CWE-305 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-03-20T18:18:01.777Z
Reserved: 2024-12-18T22:10:57.059Z
Link: CVE-2024-12776

Updated: 2025-03-20T17:49:33.301Z

Status : Received
Published: 2025-03-20T10:15:30.233
Modified: 2025-03-20T10:15:30.233
Link: CVE-2024-12776

No data.