Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-7010 | In langgenius/dify v0.10.1, the `/forgot-password/resets` endpoint does not verify the password reset code, allowing an attacker to reset the password of any user, including administrators. This vulnerability can lead to a complete compromise of the application. |
Mon, 14 Jul 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langgenius
Langgenius dify |
|
| CPEs | cpe:2.3:a:langgenius:dify:0.10.1:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Langgenius
Langgenius dify |
Thu, 20 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In langgenius/dify v0.10.1, the `/forgot-password/resets` endpoint does not verify the password reset code, allowing an attacker to reset the password of any user, including administrators. This vulnerability can lead to a complete compromise of the application. | |
| Title | Authentication Bypass in langgenius/dify | |
| Weaknesses | CWE-305 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-03-20T18:18:01.777Z
Reserved: 2024-12-18T22:10:57.059Z
Link: CVE-2024-12776
Updated: 2025-03-20T17:49:33.301Z
Status : Analyzed
Published: 2025-03-20T10:15:30.233
Modified: 2025-07-14T18:18:36.013
Link: CVE-2024-12776
No data.
OpenCVE Enrichment
Updated: 2025-07-13T11:14:43Z
EUVD