Vulnerability Description
Default credentials in Dify thru 1.5.1. PostgreSQL username and password specified in the docker-compose.yaml file included in its source code. NOTE: the Supplier reports that the Docker configuration does not make PostgreSQL (on TCP port 5432) exposed by default in version 1.0.1 or later.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Langgenius | Dify | <= 1.5.1 |
Related Weaknesses (CWE)
References
- http://dify.comBroken Link
- https://gist.github.com/Cristliu/216ddbadaf3258498c93d408683ecabdExploitMitigationThird Party Advisory
- https://gist.github.com/Cristliu/298f51cbc72c45d91632cd0d65aa8161
- https://github.com/langgenius/difyProduct
- https://github.com/langgenius/dify/issues/15285
- https://github.com/langgenius/dify/pull/15286
- https://github.com/langgenius/dify/pull/15286.diff
- https://github.com/langgenius/dify/releases/tag/1.0.1
- https://gist.github.com/Cristliu/216ddbadaf3258498c93d408683ecabdExploitMitigationThird Party Advisory
FAQ
What is CVE-2025-56157?
CVE-2025-56157 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Default credentials in Dify thru 1.5.1. PostgreSQL username and password specified in the docker-compose.yaml file included in its source code. NOTE: the Supplier reports that the Docker configuration...
How severe is CVE-2025-56157?
CVE-2025-56157 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-56157?
Check the references section above for vendor advisories and patch information. Affected products include: Langgenius Dify.