SB2025032673 - Multiple vulnerabilities in Directus



SB2025032673 - Multiple vulnerabilities in Directus

Published: March 26, 2025 Updated: April 23, 2026

Security Bulletin ID SB2025032673
Severity
High
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

High 20% Medium 60% Low 20%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Missing Release of Resource after Effective Lifetime (CVE-ID: CVE-2025-30225)

The vulnerability allows a remote attacker to cause a denial of service.

The vulnerability exists due to improper resource shutdown in asset transformation handling when processing malformed transformation requests. A remote attacker can send a burst of specially crafted transformation requests to cause a denial of service.

This issue affects S3-backed assets and can cause all assets to be served as HTTP 403 responses.


2) Resource exhaustion (CVE-ID: CVE-2025-30350)

The vulnerability allows a remote attacker to cause a denial of service.

The vulnerability exists due to improper resource management in the S3 asset handling component when processing a burst of HEAD requests. A remote attacker can send many HEAD requests to cause a denial of service.

The issue can make assets unavailable for all Directus access policies, including admin and public access.


3) Information disclosure (CVE-ID: CVE-2025-30353)

The vulnerability allows a remote attacker to disclose sensitive information.

The vulnerability exists due to exposure of sensitive information in webhook trigger flows when handling a failed condition operation with the "Data of Last Operation" response body. A remote attacker can trigger the flow with input that causes a ValidationError to disclose sensitive information.

Exposed data may include environment variables, API keys, authorization headers, user accountability information, and previous operational data.


4) Information disclosure (CVE-ID: CVE-2025-30352)

The vulnerability allows a remote attacker to disclose sensitive information.

The vulnerability exists due to improper access control in the search query parameter handling when processing search queries on collections. A remote attacker can send a search query for fields they are not permitted to view to disclose sensitive information.

Exploitation is possible when the attacker has access to a collection and can use the search query parameter against non-permitted string or numeric fields.


5) Operation on a Resource after Expiration or Release (CVE-ID: CVE-2025-30351)

The vulnerability allows a remote user to disclose sensitive information.

The vulnerability exists due to operation on a resource after revocation in verifySessionJWT when verifying a session token for API access. A remote user can reuse a previously issued session token after the associated user has been suspended to disclose sensitive information.

The issue affects session auth mode, and exploitation requires obtaining a session token while the account is still active.


Remediation

Install update from vendor's website.