CVE-2025-64746
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-13

Last updated on: 2025-12-08

Assigner: GitHub, Inc.

Description
Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 11.13.0, Directus does not properly clean up field-level permissions when a field is deleted. When a field is removed from a collection, its reference in the permissions table remains intact. This stale reference creates a security gap: if another field is later created using the same name, it inherits the outdated permission entry. This behavior can unintentionally grant roles access to data they should not be able to read or modify. The issue is particularly risky in multi-tenant or production environments, where administrators may reuse field names, assuming old permissions have been fully cleared. Version 11.13.0 fixes the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-13
Last Modified
2025-12-08
Generated
2026-05-07
AI Q&A
2025-11-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
monospace directus to 11.13.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs in Directus versions prior to 11.13.0, where when a field is deleted from a collection, its permissions are not properly removed. The permissions table retains references to the deleted field. If a new field is later created with the same name, it inherits the old permissions, potentially granting roles access to data they should not have. This creates a security gap, especially in environments where field names are reused.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized access or modification of data because roles may inherit outdated permissions for newly created fields with reused names. This can expose sensitive information or allow unintended data changes, posing a security risk particularly in multi-tenant or production environments.


What immediate steps should I take to mitigate this vulnerability?

Upgrade Directus to version 11.13.0 or later, as this version fixes the issue by properly cleaning up field-level permissions when fields are deleted.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart