CVE-2026-35442
Received Received - Intake
Information Disclosure via Aggregate Function Bypass in Directus API

Publication date: 2026-04-06

Last updated on: 2026-04-20

Assigner: GitHub, Inc.

Description
Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, aggregate functions (min, max) applied to fields with the conceal special type incorrectly return raw database values instead of the masked placeholder. When combined with groupBy, any authenticated user with read access to the affected collection can extract concealed field values, including static API tokens and two-factor authentication secrets from directus_users. This vulnerability is fixed in 11.17.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-06
Last Modified
2026-04-20
Generated
2026-05-07
AI Q&A
2026-04-07
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
monospace directus to 11.17.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects Directus, a real-time API and app dashboard for managing SQL database content. Before version 11.17.0, when aggregate functions like min and max were applied to fields marked with the conceal special type, they incorrectly returned the raw database values instead of the masked placeholder values.

When these aggregate functions were combined with the groupBy operation, any authenticated user with read access to the affected collection could extract concealed field values. This includes sensitive information such as static API tokens and two-factor authentication secrets from the directus_users collection.

This issue was fixed in Directus version 11.17.0.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized disclosure of sensitive information. Authenticated users with read access can exploit the flaw to retrieve concealed data such as static API tokens and two-factor authentication secrets.

Such exposure can compromise account security, allowing attackers to bypass authentication mechanisms or gain elevated access, potentially leading to data breaches or unauthorized actions within the system.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade Directus to version 11.17.0 or later, where the issue has been fixed.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows authenticated users with read access to extract concealed field values, including sensitive information such as static API tokens and two-factor authentication secrets. Exposure of such sensitive data can lead to violations of data protection requirements under common standards and regulations like GDPR and HIPAA, which mandate the protection of personal and authentication data.

Therefore, the vulnerability potentially compromises compliance by enabling unauthorized disclosure of sensitive information that should be masked or concealed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart