Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 11 May 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:langgenius:dify:*:*:*:*:*:node.js:*:* | |
| Metrics |
cvssV3_1
|
Mon, 04 May 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langgenius
Langgenius dify |
|
| Vendors & Products |
Langgenius
Langgenius dify |
Mon, 04 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dify is an open-source LLM app development platform. Prior to version 1.13.1, using the method POST /api/files/upload, any unauthenticated user can upload an SVG file with XSS. The method POST /v1/files/upload, which requires authentication through the application API, is also vulnerable. This issue has been patched in version 1.13.1. | |
| Title | Dify Vulnerable to Stored XSS via SVG-file upload | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-04T18:48:58.586Z
Reserved: 2026-04-24T17:15:21.833Z
Link: CVE-2026-42138
Updated: 2026-05-04T18:48:35.997Z
Status : Analyzed
Published: 2026-05-04T18:16:31.523
Modified: 2026-05-11T21:08:32.727
Link: CVE-2026-42138
No data.
OpenCVE Enrichment
Updated: 2026-05-04T19:30:02Z