Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 13 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dify
Dify dify |
|
| CPEs | cpe:2.3:a:dify:dify:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Dify
Dify dify |
|
| Metrics |
cvssV3_1
|
Thu, 12 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Feb 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langgenius
Langgenius dify |
|
| Vendors & Products |
Langgenius
Langgenius dify |
Wed, 11 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dify is an open-source LLM app development platform. Prior to 1.13.0, a cross site scripting vulnerability has been found in the web application chat frontend when using echarts. User or llm inputs containing echarts containing a specific javascript payload will be executed. This vulnerability is fixed in 1.13.0. | |
| Title | Client‑side DOM XSS in the web chat app of Dify when using echarts | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-12T21:16:35.748Z
Reserved: 2026-02-09T21:36:29.555Z
Link: CVE-2026-26023
Updated: 2026-02-12T21:16:32.099Z
Status : Analyzed
Published: 2026-02-11T22:15:52.233
Modified: 2026-02-13T15:04:10.663
Link: CVE-2026-26023
No data.
OpenCVE Enrichment
Updated: 2026-04-17T20:15:27Z