{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T12:42:09.409","vulnerabilities":[{"cve":{"id":"CVE-2024-10252","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:15.360","lastModified":"2025-07-11T20:34:47.203","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in langgenius/dify versions <=v0.9.1 allows for code injection via internal SSRF requests in the Dify sandbox service. This vulnerability enables an attacker to execute arbitrary Python code with root privileges within the sandbox environment, potentially leading to the deletion of the entire sandbox service and causing irreversible damage."},{"lang":"es","value":"Una vulnerabilidad en las versiones de langgenius/dify anteriores a la v0.9.1 permite la inyección de código mediante solicitudes SSRF internas en el servicio de la sandbox de Dify. Esta vulnerabilidad permite a un atacante ejecutar código Python arbitrario con privilegios de root dentro del entorno de la sandbox, lo que podría provocar la eliminación completa del servicio de la sandbox y causar daños irreversibles."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}],"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:langgenius:dify:*:*:*:*:*:node.js:*:*","versionEndIncluding":"0.9.1","matchCriteriaId":"FF5F727F-CC30-49A2-8B85-E1C15DC43B96"}]}]}],"references":[{"url":"https://github.com/langgenius/dify/commit/4ac99ffe0e1c9f4d7c523908e91bbc7739e0a8d4","source":"security@huntr.dev","tags":["Patch"]},{"url":"https://huntr.com/bounties/62c6c958-96cb-426c-aebc-c41f06b9d7b0","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}