Vulnerability Description
A Cross-Origin Resource Sharing (CORS) misconfiguration vulnerability exists in Dify v1.9.1 in the /console/api/setup endpoint. The endpoint implements an insecure CORS policy that reflects any Origin header and enables Access-Control-Allow-Credentials: true, permitting arbitrary external domains to make authenticated requests. NOTE: the Supplier disputes this because the endpoint configuration is intentional to support bootstrap.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Langgenius | Dify | 1.9.1 |
Related Weaknesses (CWE)
References
- https://gist.github.com/Cristliu/1610daac87c711ac3e0250c58f5cc4f9Third Party Advisory
- https://gist.github.com/Cristliu/8ad993126be05c9210c71cc7d49fa112
- https://github.com/langgenius/dify/discussionsIssue Tracking
- https://github.com/langgenius/dify/pull/32224
FAQ
What is CVE-2025-63386?
CVE-2025-63386 is a vulnerability with a CVSS score of 9.1 (CRITICAL). A Cross-Origin Resource Sharing (CORS) misconfiguration vulnerability exists in Dify v1.9.1 in the /console/api/setup endpoint. The endpoint implements an insecure CORS policy that reflects any Origin...
How severe is CVE-2025-63386?
CVE-2025-63386 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-63386?
Check the references section above for vendor advisories and patch information. Affected products include: Langgenius Dify.