We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-53887

Directus's exact version number is exposed by the OpenAPI Spec



Description

Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.0.0 and prior to version 11.9.0, the exact Directus version number is incorrectly being used as OpenAPI Spec version this means that it is being exposed by the `/server/specs/oas` endpoint without authentication. With the exact version information a malicious attacker can look for known vulnerabilities in Directus core or any of its shipped dependencies in that specific running version. Version 11.9.0 fixes the issue.

Reserved 2025-07-11 | Published 2025-07-14 | Updated 2025-07-14 | Assigner GitHub_M


MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Product status

>= 9.0.0, < 11.9.0
affected

References

github.com/...rectus/security/advisories/GHSA-rmjh-cf9q-pv7q

github.com/directus/directus/pull/25353

github.com/...ommit/e74f3e4e92edc33b5f83eefb001a3d2a85af17a3

github.com/directus/directus/releases/tag/v11.9.0

cve.org (CVE-2025-53887)

nvd.nist.gov (CVE-2025-53887)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-53887

Support options

Helpdesk Chat, Email, Knowledgebase