Session Token Exploit in Directus API Management Tool
CVE-2025-30351

3.5LOW

Key Information:

Vendor

Directus

Status
Vendor
CVE Published:
26 March 2025

What is CVE-2025-30351?

The Directus API is vulnerable due to a flaw in session authentication that allows suspended users to retain access via previously generated session tokens. This occurs because the absence of a verification step in the verifySessionJWT function permits access even when a user’s status has changed to suspended. Attackers can exploit this by first logging in while the account is active and then continuing to use the session token for unauthorized access after suspension. The vulnerability has been addressed in version 11.5.0, which implements the necessary checks.

Affected Version(s)

directus >= 10.10.0, < 11.5.0

References

CVSS V3.1

Score:
3.5
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.