GHSA-8jpw-gpr4-8cmh

Suggest an improvement
Source
https://github.com/advisories/GHSA-8jpw-gpr4-8cmh
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/11/GHSA-8jpw-gpr4-8cmh/GHSA-8jpw-gpr4-8cmh.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-8jpw-gpr4-8cmh
Aliases
  • CVE-2025-64748
Published
2025-11-13T23:06:41Z
Modified
2025-11-14T01:00:38.424729Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Directus's conceal fields are searchable if read permissions enabled
Details

Summary

A vulnerability allows authenticated users to search concealed/sensitive fields when they have read permissions. While actual values remain masked (****), successful matches can be detected through returned records, enabling enumeration attacks on sensitive data.

Details

The system permits search operations on concealed fields in the directus_users collection, including token, tfa_secret, password. Matching records are returned with masked values, but their presence confirms the searched value exists.

The "Recommended Defaults" for "App Access" grant users full read permissions to their role/user records, inadvertently enabling them to search for any user's tokens, TFA secrets, and password hashes. Attackers can leverage known password hashes from breach databases to identify accounts with compromised passwords.

Impact

This vulnerability enables: - Token enumeration - Verification of valid authentication tokens - Password hash matching - Identification of accounts using known compromised passwords - Information disclosure - Confirmation of sensitive value existence without viewing actual data - Increased attack surface - Default permissions automatically expose all deployments using recommended settings

The risk is particularly high for password fields, where attackers can cross-reference publicly available hash databases to identify vulnerable accounts.

Database specific
{
    "cwe_ids": [
        "CWE-201"
    ],
    "nvd_published_at": null,
    "github_reviewed_at": "2025-11-13T23:06:41Z",
    "severity": "MODERATE",
    "github_reviewed": true
}
References

Affected packages

npm / directus

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
11.13.0

npm / @directus/api

Package

Name
@directus/api
View open source insights on deps.dev
Purl
pkg:npm/%40directus/api

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
32.0.0