Home

Description

Directus is a real-time API and App dashboard for managing SQL database content. Before 11.14.1, a timing-based user enumeration vulnerability exists in the password reset functionality. When an invalid reset_url parameter is provided, the response time differs by approximately 500ms between existing and non-existing users, enabling reliable user enumeration. This vulnerability is fixed in 11.14.1.

PUBLISHED Reserved 2026-02-11 | Published 2026-02-12 | Updated 2026-02-13 | Assigner GitHub_M




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-203: Observable Discrepancy

Product status

< 11.14.1
affected

< 32.2.0
affected

References

github.com/...rectus/security/advisories/GHSA-jr94-gj3h-c8rf

github.com/directus/directus/pull/26485

github.com/...ommit/e69aa7a5248c6e3e822cb1ac354dee295df90b2a

github.com/directus/directus/releases/tag/v11.14.1

cve.org (CVE-2026-26185)

nvd.nist.gov (CVE-2026-26185)

Download JSON