CVE-2025-32790: Dify Allows Insecure User Role Access Control for APP DSL Exporting

6.3 CVSS

Description

Dify is an open-source LLM app development platform. In versions 0.6.8 and prior, a vulnerability was identified in the DIFY AI where normal users are improperly granted permissions to export APP DSL. The feature in '/export' should only allow administrator users to export DSL. A patched version has not been released. A workaround for this vulnerability involves updating the access control mechanisms to enforce stricter user role permissions and implementing role-based access controls (RBAC) to ensure that only users with admin privileges can export the APP DSL. This vulnerability is fixed in 0.6.13.

Classification

CVE ID: CVE-2025-32790

CVSS Base Severity: MEDIUM

CVSS Base Score: 6.3

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Problem Types

CWE-284: Improper Access Control

Affected Products

Vendor: langgenius

Product: dify

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: poc

SSVC Technical Impact: partial

SSVC Automatable: false

References

https://nvd.nist.gov/vuln/detail/CVE-2025-32790
https://github.com/langgenius/dify/security/advisories/GHSA-jp6m-v4gw-5vgp
https://github.com/langgenius/dify/pull/5841
https://github.com/langgenius/dify/commit/59ad091e69736bc9dc1a3bace62ec0a232346246

Timeline