CVE-2024-6534

MEDIUM

Directus v10.13.0 - Privilege Escalation

Title source: llm
STIX 2.1

Description

Directus v10.13.0 allows an authenticated external attacker to modify presets created by the same user to assign them to another user. This is possible because the application only validates the user parameter in the 'POST /presets' request but not in the PATCH request. When chained with CVE-2024-6533, it could result in account takeover.

References (2)

Core 2
Core References
Third Party Advisory third-party-advisory
https://fluidattacks.com/advisories/capaldi
Product product
https://directus.io/

Scores

CVSS v3 4.3
EPSS 0.0006
EPSS Percentile 17.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-639
Status published
Products (2)
monospace/directus 10.13.0
npm/directus 0 - 10.13.2npm
Published Aug 15, 2024
Tracked Since Feb 18, 2026