Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.0.0 and prior to version 11.9.0, the exact Directus version number is incorrectly being used as OpenAPI Spec version this means that it is being exposed by the `/server/specs/oas` endpoint without authentication. With the exact version information a malicious attacker can look for known vulnerabilities in Directus core or any of its shipped dependencies in that specific running version. Version 11.9.0 fixes the issue.
References
Configurations
History
16 Jul 2025, 14:19
Type | Values Removed | Values Added |
---|---|---|
First Time |
Monospace directus
Monospace |
|
CPE | cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:* | |
References | () https://github.com/directus/directus/commit/e74f3e4e92edc33b5f83eefb001a3d2a85af17a3 - Patch | |
References | () https://github.com/directus/directus/pull/25353 - Patch | |
References | () https://github.com/directus/directus/releases/tag/v11.9.0 - Release Notes | |
References | () https://github.com/directus/directus/security/advisories/GHSA-rmjh-cf9q-pv7q - Third Party Advisory |
15 Jul 2025, 13:14
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
15 Jul 2025, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-15 00:15
Updated : 2025-07-16 14:19
NVD link : CVE-2025-53887
Mitre link : CVE-2025-53887
CVE.ORG link : CVE-2025-53887
JSON object : View
Products Affected
monospace
- directus
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor