Unrated severityNVD Advisory· Published Sep 25, 2025· Updated Sep 25, 2025
Dify Has Broken Access Control on Log Message Endpoint Allows Reading of Chats of Others
CVE-2025-59422
Description
Dify is an open-source LLM app development platform. In version 1.8.1, a broken access control vulnerability on the /console/api/apps/<APP_ID>chat-messages?conversation_id=<CONVERSATION_ID>&limit=10 endpoint allows users in the same workspace to read chat messages of other users. A regular user is able to read the query data and the filename of the admins and probably other users chats, if they know the conversation_id. This impacts the confidentiality of chats. This issue has been patched in version 1.9.0.
Affected products
1- Range: = 1.8.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/langgenius/dify/commit/b2d8a7eaf1693841411934e2056042845ab4f354mitrex_refsource_MISC
- github.com/langgenius/dify/security/advisories/GHSA-jg5j-c9pq-w894mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.