Description
Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.1, when GRAPHQL_INTROSPECTION=false is configured, Directus correctly blocks standard GraphQL introspection queries (__schema, __type). However, the server_specs_graphql resolver on the /graphql/system endpoint returns an equivalent SDL representation of the schema and was not subject to the same restriction. This allowed the introspection control to be bypassed, exposing schema structure (collection names, field names, types, and relationships) to unauthenticated users at the public permission level, and to authenticated users at their permitted permission level. This vulnerability is fixed in 11.16.1.
Published: 2026-04-06
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch
AI Analysis

Impact

Directus is a real‑time API and dashboard for managing SQL databases. An earlier release than 11.16.1 contains a logic error that lets an attacker bypass the GRAPHQL_INTROSPECTION setting. The server_specs_graphql resolver, exposed on the /graphql/system endpoint, returns the full SDL representation of the GraphQL schema even when introspection queries are disabled. This reveals collection names, field names, types and relationships to unauthenticated users at the public permission level and to authenticated users at their permitted level, constituting an information disclosure that can assist in further attacks.

Affected Systems

Any Directus installation running a version earlier than 11.16.1 and having the GRAPHQL_INTROSPECTION configuration set to false is vulnerable. The flaw lives in the component that serves the /graphql/system endpoint and affects all deployments that expose the GraphQL API. Both unauthenticated visitors and users with GraphQL permissions can trigger the disclosure.

Risk and Exploitability

The CVSS score of 5.3 reflects moderate severity. With an EPSS score of less than 1 % the vulnerability is considered low probability of exploitation. It is not included in the CISA KEV catalog. Exploitation is straightforward: an attacker needs network access to the Directus instance’s /graphql/system endpoint and can retrieve the schema by issuing a simple request. Because the data disclosed consists of the schema’s structural information rather than actual content, the immediate confidentiality impact is limited, yet it can aid attackers in mapping the internal data model and planning subsequent attacks such as injection or privilege escalation.

Generated by OpenCVE AI on April 20, 2026 at 20:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Directus to version 11.16.1 or later to fix the schema discovery flaw.
  • If an upgrade is not yet possible, set GRAPHQL_INTROSPECTION to true so that all schema queries are blocked.
  • Restrict network access to the /graphql/system endpoint or disable the server_specs_graphql resolver if not required for your operations.

Generated by OpenCVE AI on April 20, 2026 at 20:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-wxwm-3fxv-mrvx Directus: GraphQL Schema SDL Disclosure Setting
History

Mon, 20 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Monospace
Monospace directus
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*
Vendors & Products Monospace
Monospace directus

Wed, 08 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Directus
Directus directus
Vendors & Products Directus
Directus directus

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.1, when GRAPHQL_INTROSPECTION=false is configured, Directus correctly blocks standard GraphQL introspection queries (__schema, __type). However, the server_specs_graphql resolver on the /graphql/system endpoint returns an equivalent SDL representation of the schema and was not subject to the same restriction. This allowed the introspection control to be bypassed, exposing schema structure (collection names, field names, types, and relationships) to unauthenticated users at the public permission level, and to authenticated users at their permitted permission level. This vulnerability is fixed in 11.16.1.
Title Directus GraphQL Schema SDL Disclosure Setting
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Directus Directus
Monospace Directus
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-08T14:05:44.361Z

Reserved: 2026-04-02T17:03:42.075Z

Link: CVE-2026-35413

cve-icon Vulnrichment

Updated: 2026-04-08T14:05:40.492Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T22:16:22.540

Modified: 2026-04-20T16:36:51.943

Link: CVE-2026-35413

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T21:00:12Z

Weaknesses