CVE-2026-35442
Information Disclosure via Aggregate Function Bypass in Directus API
Publication date: 2026-04-06
Last updated on: 2026-04-20
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| monospace | directus | to 11.17.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
| CWE-863 | The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects Directus, a real-time API and app dashboard for managing SQL database content. Before version 11.17.0, when aggregate functions like min and max were applied to fields marked with the conceal special type, they incorrectly returned the raw database values instead of the masked placeholder values.
When these aggregate functions were combined with the groupBy operation, any authenticated user with read access to the affected collection could extract concealed field values. This includes sensitive information such as static API tokens and two-factor authentication secrets from the directus_users collection.
This issue was fixed in Directus version 11.17.0.
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized disclosure of sensitive information. Authenticated users with read access can exploit the flaw to retrieve concealed data such as static API tokens and two-factor authentication secrets.
Such exposure can compromise account security, allowing attackers to bypass authentication mechanisms or gain elevated access, potentially leading to data breaches or unauthorized actions within the system.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade Directus to version 11.17.0 or later, where the issue has been fixed.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows authenticated users with read access to extract concealed field values, including sensitive information such as static API tokens and two-factor authentication secrets. Exposure of such sensitive data can lead to violations of data protection requirements under common standards and regulations like GDPR and HIPAA, which mandate the protection of personal and authentication data.
Therefore, the vulnerability potentially compromises compliance by enabling unauthorized disclosure of sensitive information that should be masked or concealed.