CVE-2025-24353

5.0 MEDIUM
Published: January 23, 2025 Modified: November 18, 2025

Description

Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 11.2.0, when sharing an item, a typical user can specify an arbitrary role. It allows the user to use a higher-privileged role to see fields that otherwise the user should not be able to see. Instances that are impacted are those that use the share feature and have specific roles hierarchy and fields that are not visible for certain roles. Version 11.2.0 contains a patch the issue.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/directus/directus/pull/23716
Source: security-advisories@github.com
Issue Tracking
https://github.com/directus/directus/releases/tag/v11.2.0
Source: security-advisories@github.com
Release Notes
https://github.com/directus/directus/security/advisories/GHSA-pmf4-v838-29hg
Source: security-advisories@github.com
Exploit Vendor Advisory
https://www.youtube.com/watch?v=DbV4IxbWzN4
Source: security-advisories@github.com
Exploit

5 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.0 / 10.0
EPSS (Exploit Probability)
0.2%
39th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

monospace