CVE-2025-24353 – Directus Role Bypass

The following table lists the changes that have been made to the
CVE-2025-24353 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Jan. 23, 2025

    Action Type Old Value New Value
    Added Description Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 11.2.0, when sharing an item, a typical user can specify an arbitrary role. It allows the user to use a higher-privileged role to see fields that otherwise the user should not be able to see. Instances that are impacted are those that use the share feature and have specific roles hierarchy and fields that are not visible for certain roles. Version 11.2.0 contains a patch the issue.
    Added CVSS V3.1 AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
    Added CWE CWE-269
    Added Reference https://github.com/directus/directus/commit/e288a43a79613dada905da683f4919c6965ac804
    Added Reference https://github.com/directus/directus/pull/23716
    Added Reference https://github.com/directus/directus/releases/tag/v11.2.0
    Added Reference https://github.com/directus/directus/security/advisories/GHSA-pmf4-v838-29hg
    Added Reference https://www.youtube.com/watch?v=DbV4IxbWzN4
Share the Post:

Related Posts