Description
Directus v10.13.0 allows an authenticated external attacker to modify presets created by the same user to assign them to another user. This is possible because the application only validates the user parameter in the 'POST /presets' request but not in the PATCH request. When chained with CVE-2024-6533, it could result in account takeover.
References (2)
Core 2
Core References
Third Party Advisory third-party-advisory
https://fluidattacks.com/advisories/capaldi
Product product
https://directus.io/
Scores
CVSS v3
4.3
EPSS
0.0006
EPSS Percentile
17.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-639
Status
published
Products (2)
monospace/directus
10.13.0
npm/directus
0 - 10.13.2npm
Published
Aug 15, 2024
Tracked Since
Feb 18, 2026