Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-7wq3-jr35-275c: Directus `search` query parameter allows enumeration of non permitted fields

Summary

The search query parameter allows users with access to a collection to filter items based on fields they do not have permission to view. This allows the enumeration of unknown field contents.

Details

The searchable columns (numbers & strings) are not checked against permissions when injecting the where clauses for applying the search query. This leads to the possibility of enumerating those un-permitted fields.

PoC

  • Create a collection with a string / numeric field, configure the permissions for the public role to not include the field created
  • Create items with identifiable content in the not permitted field
  • Query the collection and include the field content in the search parameter
  • See that results are returned, even tho the public user does not have permission to view the field content

Impact

This vulnerability is a very high impact, as for example Directus instances which allow public read access to the user avatar are vulnerable to have the email addresses, password hashes and potentially admin level access tokens extracted. The admin token and password hash extraction have a caveat, as string fields are only searched with a lower cased version of the search query.

ghsa
#vulnerability#nodejs#git
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2025-30352

Directus `search` query parameter allows enumeration of non permitted fields

Moderate severity GitHub Reviewed Published Mar 26, 2025 in directus/directus • Updated Mar 26, 2025

Package

npm directus (npm)

Affected versions

>= 9.0.0-alpha.4, < 11.5.0

Summary

The search query parameter allows users with access to a collection to filter items based on fields they do not have permission to view. This allows the enumeration of unknown field contents.

Details

The searchable columns (numbers & strings) are not checked against permissions when injecting the where clauses for applying the search query. This leads to the possibility of enumerating those un-permitted fields.

PoC

  • Create a collection with a string / numeric field, configure the permissions for the public role to not include the field created
  • Create items with identifiable content in the not permitted field
  • Query the collection and include the field content in the search parameter
  • See that results are returned, even tho the public user does not have permission to view the field content

Impact

This vulnerability is a very high impact, as for example Directus instances which allow public read access to the user avatar are vulnerable to have the email addresses, password hashes and potentially admin level access tokens extracted. The admin token and password hash extraction have a caveat, as string fields are only searched with a lower cased version of the search query.

References

  • GHSA-7wq3-jr35-275c
  • https://nvd.nist.gov/vuln/detail/CVE-2025-30352
  • directus/directus@ac5a996

Published to the GitHub Advisory Database

Mar 26, 2025

Last updated

Mar 26, 2025

ghsa: Latest News

GHSA-5rjg-fvgr-3xxf: setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write