directus
35 known vulnerabilities · 0 critical · 7 high
Directus' insufficient permission checks can enable unauthenticated users to manually trigger Flows
directus vulnerable to Insertion of Sensitive Information into Log File
Directus: Authenticated Users Can Extract Concealed Fields via Aggregate Queries
Directus: Sensitive fields exposed in revision history
Directus allows redacted data extraction on the API through "alias"
directus vulnerable to HTML Injection in Password Reset email to custom Reset URL
Directus: Open Redirect via Parser Bypass in OAuth2/SAML Authentication Flow
Directus is vulnerable to sensitive data exposure as user data is not being redacted when logged
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in directus
Directus vulnerable to Server-Side Request Forgery On File Import
Directus vulnerable to unhandled exception on illegal filename_disk value
Directus `search` query parameter allows enumeration of non permitted fields
Directus: Path Traversal and Broken Access Control in File Management API
Directus vulnerable to extraction of password hashes through export querying
Directus tokens are not redacted in flow logs, exposing session credentials to all admin
Directus allows unauthenticated file upload and file modification due to lacking input sanitization
Directus: Open Redirect in Admin 2FA Setup Page
Directus: SSRF Protection Bypass via IPv4-Mapped IPv6 Addresses in File Import
Directus: GraphQL Alias Amplification Denial of Service Due to Missing Query Cost/Complexity Limits
Directus Vulnerable to User Enumeration via Password Reset Timing Attack
Directus: GraphQL Schema SDL Disclosure Setting
Directus: TUS Upload Authorization Bypass Allows Arbitrary File Overwrite
Directus: Unauthenticated Denial of Service via GraphQL Alias Amplification of Expensive Health Check Resolver