<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-41947 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-41947/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 15:17:04 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-41947/feed.xml" rel="self" type="application/rss+xml"/><item><title>Dify Authorization Bypass Vulnerability (CVE-2026-41947)</title><link>https://feed.craftedsignal.io/briefs/2026-05-dify-auth-bypass/</link><pubDate>Mon, 18 May 2026 15:17:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dify-auth-bypass/</guid><description>Dify version 1.14.1 and prior contains an authorization bypass vulnerability (CVE-2026-41947) that allows authenticated editor users to set and enable trace configurations for any application regardless of tenant ownership, potentially leading to information disclosure by redirecting application messages to attacker-controlled LLM trace providers.</description><content:encoded><![CDATA[<p>Dify, a platform for building AI-native applications, is vulnerable to an authorization bypass (CVE-2026-41947) affecting version 1.14.1 and prior. Authenticated users with editor privileges can exploit this vulnerability to manipulate trace configurations across different tenants. The vulnerability stems from a lack of tenant ownership verification when setting and enabling trace configurations. A successful exploit allows an attacker to redirect messages and responses from victim applications to attacker-controlled LLM trace providers, effectively intercepting and potentially exfiltrating sensitive data processed by the targeted applications. The Dify Cloud offering allows unauthenticated free self-registration, lowering the barrier to entry for attackers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker registers an account on Dify Cloud (if using Dify Cloud) or gains editor privileges on a Dify instance.</li>
<li>Attacker authenticates to the Dify platform using their account credentials.</li>
<li>Attacker identifies the target application they wish to monitor by enumerating available applications or through other means.</li>
<li>Attacker crafts a malicious API request to set the trace configuration for the target application. The request specifies an attacker-controlled LLM trace provider endpoint.</li>
<li>The trace configuration endpoint lacks proper tenant ownership checks, allowing the attacker to modify the configuration of the target application.</li>
<li>Attacker enables the trace configuration for the target application.</li>
<li>All subsequent messages and responses from the victim application are redirected to the attacker-controlled LLM trace provider.</li>
<li>Attacker intercepts and analyzes the redirected messages to extract sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41947 can lead to unauthorized access to sensitive information processed by Dify applications. An attacker can intercept application messages and responses, potentially exposing confidential data, intellectual property, or personally identifiable information (PII). The severity of the impact depends on the nature of the data handled by the compromised applications, but the vulnerability could affect all Dify users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the necessary patches or upgrade to a version of Dify beyond 1.14.1 to remediate CVE-2026-41947.</li>
<li>Implement the &ldquo;Detect Dify Unauthorized Trace Configuration Change&rdquo; Sigma rule to identify potential exploitation attempts.</li>
<li>Implement the &ldquo;Detect Dify Trace Configuration Creation to External Host&rdquo; Sigma rule to identify creation of traces that lead to external endpoints.</li>
<li>Review and restrict editor privileges to only those users who require them, minimizing the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authorization-bypass</category><category>privilege-escalation</category><category>cve-2026-41947</category></item></channel></rss>