Insufficient Session Expiration in Directus - CVE-2024-34709

 

Insufficient Session Expiration in Directus - CVE-2024-34709

Published: May 13, 2024 / Updated: April 23, 2026


Vulnerability identifier: #VU127099
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2024-34709
CWE-ID: CWE-613
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Directus
Software vendor:
Directus

Description

The vulnerability allows a remote user to reuse a leaked session token to access a session after logout.

The vulnerability exists due to insufficient session expiration in session token validation when processing authenticated requests with a previously captured session cookie. A remote user can replay a captured session token to reuse a session after logout.

User interaction is required, and exploitation depends on obtaining the session cookie value before logout or refresh.


Remediation

Install security update from vendor's website.

External links