CVE-2025-64746
MEDIUMMonospace Directus < 11.13.0 - Incorrect Authorization
Title source: ruleDescription
Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 11.13.0, Directus does not properly clean up field-level permissions when a field is deleted. When a field is removed from a collection, its reference in the permissions table remains intact. This stale reference creates a security gap: if another field is later created using the same name, it inherits the outdated permission entry. This behavior can unintentionally grant roles access to data they should not be able to read or modify. The issue is particularly risky in multi-tenant or production environments, where administrators may reuse field names, assuming old permissions have been fully cleared. Version 11.13.0 fixes the issue.
References (2)
Core 2
Core References
Exploit, Vendor Advisory x_refsource_confirm
https://github.com/directus/directus/security/advisories/GHSA-9x5g-62gj-wqf2
Scores
CVSS v3
4.6
EPSS
0.0004
EPSS Percentile
12.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-284
CWE-863
Status
published
Products (2)
monospace/directus
< 11.13.0
npm/directus
0 - 11.13.0npm
Published
Nov 13, 2025
Tracked Since
Feb 18, 2026