CVE-2021-26593
HIGHRangerstudio Directus < 8.8.1 - Information Disclosure
Title source: ruleDescription
In Directus 8.x through 8.8.1, an attacker can see all users in the CMS using the API /users/{id}. For each call, they get in response a lot of information about the user (such as email address, first name, and last name) but also the secret for 2FA if one exists. This secret can be regenerated. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References (1)
Core 1
Core References
Exploit, Third Party Advisory x_refsource_misc
https://github.com/sgranel/directusv8
Scores
CVSS v3
7.5
EPSS
0.0032
EPSS Percentile
54.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-200
Status
published
Products (1)
rangerstudio/directus
8.0.0 - 8.8.1
Published
Feb 23, 2021
Tracked Since
Feb 18, 2026