CVE-2024-34709
MEDIUMMonospace Directus < 10.11.0 - Insufficient Session Expiration
Title source: ruleDescription
Directus is a real-time API and App dashboard for managing SQL database content. Prior to 10.11.0, session tokens function like the other JWT tokens where they are not actually invalidated when logging out. The `directus_session` gets destroyed and the cookie gets deleted but if the cookie value is captured, it will still work for the entire expiry time which is set to 1 day by default. Making it effectively a long lived unrevokable stateless token instead of the stateful session token it was meant to be. This vulnerability is fixed in 10.11.0.
Scores
CVSS v3
5.4
EPSS
0.0023
EPSS Percentile
45.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-613
Status
published
Products (2)
monospace/directus
< 10.11.0
npm/directus
10.10.0 - 10.11.0npm
Published
May 14, 2024
Tracked Since
Feb 18, 2026