Report: CVE-2026-41948 - Dify v1.14.1 Path Traversal via Plugin Daemon Internal API Access - Expert Insights

Report: CVE-2026-41948 - Dify v1.14.1 Path Traversal via Plugin Daemon Internal API Access - Expert Insights

CVE ID :CVE-2026-41948 Published : May 18, 2026, 1:50 p.m. | 1 hour, 17 minutes ago Description :Dify version 1.14.1 and prior contain a path traversal vulnerability that allows authenticated users to manipulate requests forwarded to the Plugin Daemon's internal REST API by exploiting insufficient URL path sanitization. Attackers can traverse out of their authorized tenant path using unencoded dot sequences in task identifiers or manipulated filename parameters to access internal endpoints such as debug interfaces, requiring only knowledge of the victim tenant's UUID. NOTE: Dify Cloud allows unauthenticated free self-registration, making account creation trivially accessible to any attacker. Severity: 9.2 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
CRITICAL
Published
May 18, 2026
Impact: path traversal