Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2025-21409 | Directus tokens are not redacted in flow logs, exposing session credentials to all admin |
![]() |
GHSA-f24x-rm6g-3w5v | Directus tokens are not redacted in flow logs, exposing session credentials to all admin |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 16 Jul 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Monospace
Monospace directus |
|
CPEs | cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:* | |
Vendors & Products |
Monospace
Monospace directus |
Tue, 15 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 15 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Mon, 14 Jul 2025 23:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.0.0 and prior to version 11.9.0, when using Directus Flows with the WebHook trigger all incoming request details are logged including security sensitive data like access and refresh tokens in cookies. Malicious admins with access to the logs can hijack the user sessions within the token expiration time of them triggering the Flow. Version 11.9.0 fixes the issue. | |
Title | Directus doesn't redact tokens in Flow logs | |
Weaknesses | CWE-200 CWE-212 CWE-532 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-07-15T13:41:18.865Z
Reserved: 2025-07-11T19:05:23.824Z
Link: CVE-2025-53886

Updated: 2025-07-15T13:41:09.615Z

Status : Analyzed
Published: 2025-07-15T00:15:23.690
Modified: 2025-07-16T14:19:03.560
Link: CVE-2025-53886

No data.

Updated: 2025-07-16T21:35:34Z