5.3
CVSSv3

CVE-2025-30352

CVSSv4: NA | CVSSv3: 5.3 | CVSSv2: NA | VMScore: 630 | EPSS: 0.0003 | KEV: Not Included
Published: 26/03/2025 Updated: 27/03/2025

Vulnerability Summary

Directus SQL Injection via Unrestricted `search` Query Parameter Permissions

Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.0.0-alpha.4 and prior to version 11.5.0, the `search` query parameter allows users with access to a collection to filter items based on fields they do not have permission to view. This allows the enumeration of unknown field contents. The searchable columns (numbers & strings) are not checked against permissions when injecting the `where` clauses for applying the search query. This leads to the possibility of enumerating those un-permitted fields. Version 11.5.0 fixes the issue.

Vulnerable Product Search on Vulmon Subscribe to Product

directus directus