Session Token Exploit in Directus API Management Tool
CVE-2025-30351
3.5LOW
What is CVE-2025-30351?
The Directus API is vulnerable due to a flaw in session authentication that allows suspended users to retain access via previously generated session tokens. This occurs because the absence of a verification step in the verifySessionJWT
function permits access even when a user’s status has changed to suspended. Attackers can exploit this by first logging in while the account is active and then continuing to use the session token for unauthorized access after suspension. The vulnerability has been addressed in version 11.5.0, which implements the necessary checks.
Affected Version(s)
directus >= 10.10.0, < 11.5.0