{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T06:25:38.052","vulnerabilities":[{"cve":{"id":"CVE-2024-11850","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:25.913","lastModified":"2025-07-15T16:00:30.000","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A stored cross-site scripting (XSS) vulnerability exists in the latest version of langgenius/dify. The vulnerability is due to improper validation and sanitization of user input in SVG markdown support within the chatbot feature. An attacker can exploit this vulnerability by injecting malicious SVG content, which can execute arbitrary JavaScript code when viewed by an admin, potentially leading to credential theft."},{"lang":"es","value":"Existe una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la última versión de langgenius/dify. Esta vulnerabilidad se debe a una validación y desinfección incorrectas de la entrada del usuario en la compatibilidad con SVG Markdown dentro de la función de chatbot. Un atacante puede explotar esta vulnerabilidad inyectando contenido SVG malicioso, que puede ejecutar código JavaScript arbitrario al ser visto por un administrador, lo que podría provocar el robo de credenciales."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":4.0}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:langgenius:dify:0.9.2:*:*:*:*:node.js:*:*","matchCriteriaId":"1D17DCAA-51C0-4EF0-8745-E60F995B9B56"}]}]}],"references":[{"url":"https://huntr.com/bounties/893da115-028d-4718-b586-a2b77897a470","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}