Dify is an open-source LLM app development platform. Prior to 1.13.0, a cross site scripting vulnerability has been found in the web application chat frontend when using echarts. User or llm inputs containing echarts containing a specific javascript payload will be executed. This vulnerability is fixed in 1.13.0.
References
| Link | Resource |
|---|---|
| https://github.com/langgenius/dify/commit/378a1d7d08bd0ac5c75eaadc075a0f35211fcb8e | Patch |
| https://github.com/langgenius/dify/releases/tag/1.13.0 | Product Release Notes |
| https://github.com/langgenius/dify/security/advisories/GHSA-qqjx-5h5w-x5vj | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-02-11 22:15
Updated : 2026-02-13 15:04
NVD link : CVE-2026-26023
Mitre link : CVE-2026-26023
CVE.ORG link : CVE-2026-26023
JSON object : View
Products Affected
dify
- dify
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
