Description
Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.1, an open redirect vulnerability exists in the login redirection logic. The isLoginRedirectAllowed function fails to correctly identify certain malformed URLs as external, allowing attackers to bypass redirect allow-list validation and redirect users to arbitrary external domains upon successful authentication. This vulnerability is fixed in 11.16.1.
Published: 2026-04-06
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Open redirect during authentication
Action: Patch
AI Analysis

Impact

The vulnerability arises from the login redirect logic in Directus before version 11.16.1. The isLoginRedirectAllowed function fails to correctly detect malformed URLs as external. This allows attackers to bypass the redirect allow-list and send users to arbitrary external domains after authentication. The primary impact is that authenticated users can be redirected to malicious sites, enabling phishing and credential harvesting.

Affected Systems

Affected systems are Directus installations running any version prior to 11.16.1. The vulnerability is present in the directus:directus product and was fixed in Directus 11.16.1. Users of earlier releases should evaluate their environment and prepare an upgrade.

Risk and Exploitability

Risk assessment: The CVSS score is 6.1, indicating moderate severity. EPSS is not provided, and the vulnerability is not listed in CISA KEV. The attack vector is likely remote and requires an attacker to supply a crafted redirect parameter during the OAuth2/SAML authentication flow. Because the exploit is straightforward once the login flow is accessed, the potential for malicious redirection is significant, especially in environments where users trust the application for authentication. Therefore, the risk is moderate but still warrants prompt remediation.

Generated by OpenCVE AI on April 7, 2026 at 01:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Directus to version 11.16.1 or later.
  • If upgrading is not immediately possible, restrict authentication redirect URLs to trusted domains and validate them before redirecting.
  • Monitor authentication logs for unexpected redirect destinations and block suspicious activity.

Generated by OpenCVE AI on April 7, 2026 at 01:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-cf45-hxwj-4cfj Directus: Open Redirect via Parser Bypass in OAuth2/SAML Authentication Flow
History

Mon, 20 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Monospace
Monospace directus
CPEs cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*
Vendors & Products Monospace
Monospace directus

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Directus
Directus directus
Vendors & Products Directus
Directus directus

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.1, an open redirect vulnerability exists in the login redirection logic. The isLoginRedirectAllowed function fails to correctly identify certain malformed URLs as external, allowing attackers to bypass redirect allow-list validation and redirect users to arbitrary external domains upon successful authentication. This vulnerability is fixed in 11.16.1.
Title Directus has an Open Redirect via Parser Bypass in OAuth2/SAML Authentication Flow
Weaknesses CWE-184
CWE-601
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Directus Directus
Monospace Directus
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T15:09:07.019Z

Reserved: 2026-04-02T17:03:42.075Z

Link: CVE-2026-35410

cve-icon Vulnrichment

Updated: 2026-04-07T14:47:31.139Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T22:16:22.097

Modified: 2026-04-20T16:43:55.553

Link: CVE-2026-35410

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T09:36:48Z

Weaknesses