Description
Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, Directus's Single Sign-On (SSO) login pages lacked a Cross-Origin-Opener-Policy (COOP) HTTP response header. Without this header, a malicious cross-origin window that opens the Directus login page retains the ability to access and manipulate the window object of that page. An attacker can exploit this to intercept and redirect the OAuth authorization flow to an attacker-controlled OAuth client, causing the victim to unknowingly grant access to their authentication provider account (e.g. Google, Discord). This vulnerability is fixed in 11.17.0.
Published: 2026-04-06
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized OAuth redirection leading to account compromise
Action: Apply Patch
AI Analysis

Impact

Directus, a real‑time API and dashboard for SQL databases, had a missing Cross‑Origin‑Opener‑Policy header on its Single‑Sign‑On login pages before version 11.17.0. Because the COOP header was absent, a malicious cross‑origin window that opens the Directus login tab could read and write properties of the login page’s window object. Attackers can then intercept the OAuth authorization flow and redirect it to a malicious OAuth client. This allows the victim to unknowingly grant the attacker access to their authentication provider account, such as Google or Discord.

Affected Systems

The vulnerability affects instances of Directus running any version prior to 11.17.0. Vendors listed in the CNA entry—Directus Inc.—should review their deployments to confirm whether SSO login pages are exposed. No specific sub‑versions are enumerated, so all releases before the patch should be considered at risk.

Risk and Exploitability

The computed CVSS score of 8.7 indicates a high‑severity flaw with a substantial impact on confidentiality and integrity. The lack of an EPSS score or KEV listing suggests that there is currently no widespread exploitation evidence, yet the vulnerability is trivially exploitable by any site that can open the Directus SSO login in a cross‑origin context. Attackers would need to entice a user to visit a malicious page that opens, manipulates, and then redirects the OAuth flow, making this vulnerability fall into the realm of social‑engineering or web‑page manipulation tactics.

Generated by OpenCVE AI on April 7, 2026 at 01:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Directus to version 11.17.0 or later.
  • Verify that the SSO login pages now include the Cross-Origin-Opener-Policy header and exhibit expected behavior.

Generated by OpenCVE AI on April 7, 2026 at 01:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-8m32-p958-jg99 Directus: Missing Cross-Origin Opener Policy
History

Mon, 20 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Monospace
Monospace directus
CPEs cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*
Vendors & Products Monospace
Monospace directus

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Directus
Directus directus
Vendors & Products Directus
Directus directus

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, Directus's Single Sign-On (SSO) login pages lacked a Cross-Origin-Opener-Policy (COOP) HTTP response header. Without this header, a malicious cross-origin window that opens the Directus login page retains the ability to access and manipulate the window object of that page. An attacker can exploit this to intercept and redirect the OAuth authorization flow to an attacker-controlled OAuth client, causing the victim to unknowingly grant access to their authentication provider account (e.g. Google, Discord). This vulnerability is fixed in 11.17.0.
Title Directus is Missing Cross-Origin Opener Policy
Weaknesses CWE-346
CWE-693
References
Metrics cvssV3_1

{'score': 8.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}


Subscriptions

Directus Directus
Monospace Directus
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T16:23:42.264Z

Reserved: 2026-04-02T17:03:42.075Z

Link: CVE-2026-35408

cve-icon Vulnrichment

Updated: 2026-04-07T16:23:39.269Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T22:16:21.557

Modified: 2026-04-20T16:53:51.217

Link: CVE-2026-35408

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T09:36:51Z

Weaknesses