Description
Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, the PATCH /files/{id} endpoint accepts a user-controlled filename_disk parameter. By setting this value to match the storage path of another user's file, an attacker can overwrite that file's content while manipulating metadata fields such as uploaded_by to obscure the tampering. This vulnerability is fixed in 11.17.0.
Published: 2026-04-09
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized file modification
Action: Immediate Patch
AI Analysis

Impact

Directus exposes a PATCH endpoint that accepts a filename_disk parameter supplied by the client. By setting this value to the storage location of another user’s file, an attacker can overwrite that file’s contents and alter metadata such as uploaded_by. The flaw represents a path traversal and broken access control weakness, allowing arbitrary data tampering and potential forgery of audit records. The underlying weakness is a lack of proper authorization checks and input validation for the filename_disk field.

Affected Systems

All releases of Directus older than version 11.17.0, including 11.16.x and earlier, are affected. The vulnerability exists in the API and dashboard components that manage file storage. Users and administrators must verify whether their deployed instances belong to this affected range and plan an upgrade accordingly.

Risk and Exploitability

The CVSS score of 8.5 indicates high severity, but the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. It is not listed in the CISA KEV catalog. Attackers likely need API access and sufficient privileges to send a crafted PATCH request to /files/{id}. Authentication is not explicitly stated but it is inferred that an authenticated session is required, as the request targets a protected CRUD endpoint. Successful exploitation would enable overwriting arbitrary files, compromising data integrity and potentially enabling broader system compromise.

Generated by OpenCVE AI on April 14, 2026 at 19:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Directus to version 11.17.0 or later to apply the vendor fix.
  • Restrict the /files API to users with appropriate permissions and enforce role-based access control.
  • Validate and sanitize the filename_disk parameter to eliminate path traversal possibilities.
  • Monitor access logs for unexpected file modification attempts and investigate suspicious activity.

Generated by OpenCVE AI on April 14, 2026 at 19:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-393c-p46r-7c95 Directus: Path Traversal and Broken Access Control in File Management API
History

Tue, 14 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Monospace
Monospace directus
CPEs cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*
Vendors & Products Monospace
Monospace directus

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Directus
Directus directus
Vendors & Products Directus
Directus directus

Fri, 10 Apr 2026 04:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, the PATCH /files/{id} endpoint accepts a user-controlled filename_disk parameter. By setting this value to match the storage path of another user's file, an attacker can overwrite that file's content while manipulating metadata fields such as uploaded_by to obscure the tampering. This vulnerability is fixed in 11.17.0.
Title Directus has a Path Traversal and Broken Access Control in File Management API
Weaknesses CWE-284
CWE-639
References
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N'}


Subscriptions

Directus Directus
Monospace Directus
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-09T19:37:24.389Z

Reserved: 2026-04-07T22:40:33.820Z

Link: CVE-2026-39942

cve-icon Vulnrichment

Updated: 2026-04-09T17:47:36.272Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T17:16:29.813

Modified: 2026-04-14T17:36:25.930

Link: CVE-2026-39942

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:00:07Z

Weaknesses