CVE-2021-26593

HIGH

Rangerstudio Directus < 8.8.1 - Information Disclosure

Title source: rule
STIX 2.1

Description

In Directus 8.x through 8.8.1, an attacker can see all users in the CMS using the API /users/{id}. For each call, they get in response a lot of information about the user (such as email address, first name, and last name) but also the secret for 2FA if one exists. This secret can be regenerated. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

References (1)

Core 1
Core References
Exploit, Third Party Advisory x_refsource_misc
https://github.com/sgranel/directusv8

Scores

CVSS v3 7.5
EPSS 0.0032
EPSS Percentile 54.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

CWE
CWE-200
Status published
Products (1)
rangerstudio/directus 8.0.0 - 8.8.1
Published Feb 23, 2021
Tracked Since Feb 18, 2026