We found results for “”
CVE-2025-64748
Good to know:
Date: November 13, 2025
Directus is a real-time API and App dashboard for managing SQL database content. A vulnerability in versions prior to 11.13.0 allows authenticated users to search concealed/sensitive fields when they have read permissions. While actual values remain masked ("****"), successful matches can be detected through returned records, enabling enumeration attacks on sensitive data. Version 11.13.0 fixes the issue.
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Insertion of Sensitive Information Into Sent Data
CWE-201Top Fix
Upgrade Version
Upgrade to version directus - 11.13.0;@directus/api - 32.0.0;https://github.com/directus/directus.git - v11.13.0
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | NONE |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


