Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.12.0 and prior to version 11.5.0, when a Flow with the "Webhook" trigger and the "Data of Last Operation" response body encounters a ValidationError thrown by a failed condition operation, the API response includes sensitive data. This includes environmental variables, sensitive API keys, user accountability information, and operational data. This issue poses a significant security risk, as any unintended exposure of this data could lead to potential misuse. Version 11.5.0 fixes the issue.
History

Tue, 26 Aug 2025 02:00:00 +0000

Type Values Removed Values Added
First Time appeared Monospace
Monospace directus
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*
Vendors & Products Monospace
Monospace directus

Wed, 26 Mar 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 26 Mar 2025 17:30:00 +0000

Type Values Removed Values Added
Description Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.12.0 and prior to version 11.5.0, when a Flow with the "Webhook" trigger and the "Data of Last Operation" response body encounters a ValidationError thrown by a failed condition operation, the API response includes sensitive data. This includes environmental variables, sensitive API keys, user accountability information, and operational data. This issue poses a significant security risk, as any unintended exposure of this data could lead to potential misuse. Version 11.5.0 fixes the issue.
Title Directus's webhook trigger flows can leak sensitive data
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-03-26T17:26:51.803Z

Updated: 2025-03-26T17:44:22.290Z

Reserved: 2025-03-21T14:12:06.270Z

Link: CVE-2025-30353

cve-icon Vulnrichment

Updated: 2025-03-26T17:44:13.597Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-26T18:15:27.327

Modified: 2025-08-26T01:47:43.713

Link: CVE-2025-30353

cve-icon Redhat

No data.