Description
Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, aggregate functions (min, max) applied to fields with the conceal special type incorrectly return raw database values instead of the masked placeholder. When combined with groupBy, any authenticated user with read access to the affected collection can extract concealed field values, including static API tokens and two-factor authentication secrets from directus_users. This vulnerability is fixed in 11.17.0.
Published: 2026-04-06
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Confidentiality Breach
Action: Immediate Patch
AI Analysis

Impact

Directus, an API and dashboard platform, had a flaw in aggregate functions where fields designated as concealed returned their raw database values instead of a masked placeholder. This allowed any user with read access to a collection to use min or max functions combined with groupBy to retrieve sensitive data such as API tokens and two‑factor authentication secrets stored in concealed fields. The vulnerability results in direct disclosure of confidential information, matching CWE‑200 and CWE‑863.

Affected Systems

All installations of Directus running any version prior to 11.17.0 are affected, including the 11.x series up to 11.16.9. The issue is specific to the directus:directus product listed by the CNA and impacts collections where fields are marked as concealed.

Risk and Exploitability

The CVSS score of 8.1 classifies this as high severity. Although EPSS data is not available and it is not listed in the KEV catalog, the flaw requires only authenticated read access, which many users already possess. Therefore, the risk of exploitation remains significant, especially for organizations with broad read permissions on sensitive collections.

Generated by OpenCVE AI on April 7, 2026 at 01:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Directus to version 11.17.0 or later.
  • Verify that all concealed fields no longer expose raw values through aggregate queries.
  • Review any previously exposed tokens or 2FA secrets and rotate them as necessary.

Generated by OpenCVE AI on April 7, 2026 at 01:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-38hg-ww64-rrwc Directus: Authenticated Users Can Extract Concealed Fields via Aggregate Queries
History

Mon, 20 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Monospace
Monospace directus
CPEs cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*
Vendors & Products Monospace
Monospace directus

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Directus
Directus directus
Vendors & Products Directus
Directus directus

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, aggregate functions (min, max) applied to fields with the conceal special type incorrectly return raw database values instead of the masked placeholder. When combined with groupBy, any authenticated user with read access to the affected collection can extract concealed field values, including static API tokens and two-factor authentication secrets from directus_users. This vulnerability is fixed in 11.17.0.
Title Directus: Authenticated Users Can Extract Concealed Fields via Aggregate Queries
Weaknesses CWE-200
CWE-863
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Directus Directus
Monospace Directus
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T13:30:12.880Z

Reserved: 2026-04-02T19:25:52.192Z

Link: CVE-2026-35442

cve-icon Vulnrichment

Updated: 2026-04-07T13:30:08.487Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T22:16:22.853

Modified: 2026-04-20T16:32:37.287

Link: CVE-2026-35442

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T09:36:43Z

Weaknesses