{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-15T08:07:46.287","vulnerabilities":[{"cve":{"id":"CVE-2024-11822","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:25.677","lastModified":"2025-04-01T20:35:15.637","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"langgenius/dify version 0.9.1 contains a Server-Side Request Forgery (SSRF) vulnerability. The vulnerability exists due to improper handling of the api_endpoint parameter, allowing an attacker to make direct requests to internal network services. This can lead to unauthorized access to internal servers and potentially expose sensitive information, including access to the AWS metadata endpoint."},{"lang":"es","value":"La versión 0.9.1 de langgenius/dify contiene una vulnerabilidad de Server-Side Request Forgery (SSRF). Esta vulnerabilidad se debe a la gestión incorrecta del parámetro api_endpoint, lo que permite a un atacante realizar solicitudes directas a los servicios de red internos. Esto puede provocar acceso no autorizado a servidores internos y potencialmente exponer información confidencial, incluido el acceso al endpoint de metadatos de AWS."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-918"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dify:dify:0.9.1:*:*:*:*:*:*:*","matchCriteriaId":"C16C43FE-B75C-433E-9505-349D10CDBD8A"}]}]}],"references":[{"url":"https://huntr.com/bounties/f3042029-5d4e-41c6-850d-bbe02fae6592","source":"security@huntr.dev","tags":["Exploit"]},{"url":"https://huntr.com/bounties/f3042029-5d4e-41c6-850d-bbe02fae6592","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit"]}]}}]}