<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Dify Cloud — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/dify-cloud/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 15:17:16 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/dify-cloud/feed.xml" rel="self" type="application/rss+xml"/><item><title>Dify Path Traversal Vulnerability (CVE-2026-41948)</title><link>https://feed.craftedsignal.io/briefs/2026-05-dify-path-traversal/</link><pubDate>Mon, 18 May 2026 15:17:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dify-path-traversal/</guid><description>Dify version 1.14.1 and prior contain a path traversal vulnerability (CVE-2026-41948) that allows authenticated users to manipulate requests to the Plugin Daemon's internal REST API and access internal endpoints by traversing out of their authorized tenant path.</description><content:encoded><![CDATA[<p>Dify, a platform for building AI applications, is vulnerable to a path traversal flaw affecting version 1.14.1 and earlier. This vulnerability, identified as CVE-2026-41948, allows authenticated users to manipulate requests forwarded to the Plugin Daemon&rsquo;s internal REST API. Attackers can exploit insufficient URL path sanitization to traverse out of their authorized tenant path using unencoded dot sequences (../) in task identifiers or manipulated filename parameters. This enables access to internal endpoints, including debug interfaces.  Notably, Dify Cloud&rsquo;s free self-registration feature lowers the barrier to entry, as attackers can trivially create accounts to probe and exploit the vulnerability, only requiring knowledge of the victim tenant&rsquo;s UUID. This could lead to sensitive information disclosure or unauthorized modifications within the Dify environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker registers a free account on Dify Cloud.</li>
<li>Attacker identifies the UUID of a target tenant within Dify Cloud.</li>
<li>Attacker crafts a malicious request to the Plugin Daemon&rsquo;s internal REST API, embedding a path traversal sequence (e.g., <code>../</code>) in a task identifier or filename parameter.</li>
<li>The crafted request bypasses URL path sanitization due to insufficient validation of dot sequences.</li>
<li>The request is forwarded to an internal endpoint outside of the attacker&rsquo;s authorized tenant path.</li>
<li>The attacker gains access to internal endpoints, such as debug interfaces.</li>
<li>Attacker leverages access to internal endpoints to gather sensitive information about the target tenant or the Dify Cloud infrastructure.</li>
<li>Attacker escalates privileges or performs unauthorized actions based on the gained information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41948 allows attackers to bypass tenant isolation within Dify environments. This can lead to the disclosure of sensitive information, such as API keys, internal configurations, or user data, from other tenants. The vulnerability could also allow attackers to perform unauthorized actions, such as modifying configurations or deploying malicious plugins, potentially impacting multiple users of the platform. Given that Dify Cloud offers free self-registration, the barrier to entry for exploitation is low, increasing the potential scope of impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Dify to a version patched against CVE-2026-41948 to remediate the path traversal vulnerability.</li>
<li>Implement robust input validation and sanitization on URL paths within the Plugin Daemon&rsquo;s internal REST API to prevent path traversal attacks.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences (e.g., <code>../</code>) in URLs targeting the Plugin Daemon&rsquo;s API, using the provided Sigma rule.</li>
<li>Review and restrict access to internal endpoints to minimize the potential impact of unauthorized access.</li>
<li>Implement strict tenant isolation policies and regularly audit access controls to prevent cross-tenant access.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>path-traversal</category><category>privilege-escalation</category><category>cloud</category></item><item><title>Dify Authorization Bypass Vulnerability (CVE-2026-41947)</title><link>https://feed.craftedsignal.io/briefs/2026-05-dify-auth-bypass/</link><pubDate>Mon, 18 May 2026 15:17:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dify-auth-bypass/</guid><description>Dify version 1.14.1 and prior contains an authorization bypass vulnerability (CVE-2026-41947) that allows authenticated editor users to set and enable trace configurations for any application regardless of tenant ownership, potentially leading to information disclosure by redirecting application messages to attacker-controlled LLM trace providers.</description><content:encoded><![CDATA[<p>Dify, a platform for building AI-native applications, is vulnerable to an authorization bypass (CVE-2026-41947) affecting version 1.14.1 and prior. Authenticated users with editor privileges can exploit this vulnerability to manipulate trace configurations across different tenants. The vulnerability stems from a lack of tenant ownership verification when setting and enabling trace configurations. A successful exploit allows an attacker to redirect messages and responses from victim applications to attacker-controlled LLM trace providers, effectively intercepting and potentially exfiltrating sensitive data processed by the targeted applications. The Dify Cloud offering allows unauthenticated free self-registration, lowering the barrier to entry for attackers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker registers an account on Dify Cloud (if using Dify Cloud) or gains editor privileges on a Dify instance.</li>
<li>Attacker authenticates to the Dify platform using their account credentials.</li>
<li>Attacker identifies the target application they wish to monitor by enumerating available applications or through other means.</li>
<li>Attacker crafts a malicious API request to set the trace configuration for the target application. The request specifies an attacker-controlled LLM trace provider endpoint.</li>
<li>The trace configuration endpoint lacks proper tenant ownership checks, allowing the attacker to modify the configuration of the target application.</li>
<li>Attacker enables the trace configuration for the target application.</li>
<li>All subsequent messages and responses from the victim application are redirected to the attacker-controlled LLM trace provider.</li>
<li>Attacker intercepts and analyzes the redirected messages to extract sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41947 can lead to unauthorized access to sensitive information processed by Dify applications. An attacker can intercept application messages and responses, potentially exposing confidential data, intellectual property, or personally identifiable information (PII). The severity of the impact depends on the nature of the data handled by the compromised applications, but the vulnerability could affect all Dify users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the necessary patches or upgrade to a version of Dify beyond 1.14.1 to remediate CVE-2026-41947.</li>
<li>Implement the &ldquo;Detect Dify Unauthorized Trace Configuration Change&rdquo; Sigma rule to identify potential exploitation attempts.</li>
<li>Implement the &ldquo;Detect Dify Trace Configuration Creation to External Host&rdquo; Sigma rule to identify creation of traces that lead to external endpoints.</li>
<li>Review and restrict editor privileges to only those users who require them, minimizing the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authorization-bypass</category><category>privilege-escalation</category><category>cve-2026-41947</category></item></channel></rss>