Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 09 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dify
Dify dify |
|
| CPEs | cpe:2.3:a:dify:dify:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Dify
Dify dify |
|
| Metrics |
cvssV3_1
|
Mon, 02 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langgenius
Langgenius dify |
|
| Vendors & Products |
Langgenius
Langgenius dify |
Fri, 27 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Feb 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dify is an open-source LLM app development platform. Prior to 1.9.0, responses from the Dify API to existing and non-existent accounts differ, allowing an attacker to enumerate email addresses registered with Dify. Version 1.9.0 fixes the issue. | |
| Title | Dify has a user enumeration issue | |
| Weaknesses | CWE-204 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-27T20:45:44.126Z
Reserved: 2026-02-26T01:52:58.735Z
Link: CVE-2026-28288
Updated: 2026-02-27T20:44:40.914Z
Status : Analyzed
Published: 2026-02-27T21:16:18.853
Modified: 2026-03-09T20:23:10.170
Link: CVE-2026-28288
No data.
OpenCVE Enrichment
Updated: 2026-04-17T14:00:15Z