{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T15:27:55.138","vulnerabilities":[{"cve":{"id":"CVE-2024-12776","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:30.233","lastModified":"2025-07-14T18:18:36.013","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In langgenius/dify v0.10.1, the `/forgot-password/resets` endpoint does not verify the password reset code, allowing an attacker to reset the password of any user, including administrators. This vulnerability can lead to a complete compromise of the application."},{"lang":"es","value":"En langgenius/dify v0.10.1, el endpoint `/forgot-password/resets` no verifica el código de restablecimiento de contraseña, lo que permite a un atacante restablecer la contraseña de cualquier usuario, incluidos los administradores. Esta vulnerabilidad puede comprometer completamente la aplicación."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-305"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:langgenius:dify:0.10.1:*:*:*:*:node.js:*:*","matchCriteriaId":"BBCA5D7F-39A8-4B8F-9DFF-383365E0AFCD"}]}]}],"references":[{"url":"https://huntr.com/bounties/00a8b403-7da5-431e-afa3-40339cf734bf","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}