Directus is a real-time API and App dashboard for managing SQL database content. Before 11.14.1, a timing-based user enumeration vulnerability exists in the password reset functionality. When an invalid reset_url parameter is provided, the response time differs by approximately 500ms between existing and non-existing users, enabling reliable user enumeration. This vulnerability is fixed in 11.14.1.
References
| Link | Resource |
|---|---|
| https://github.com/directus/directus/commit/e69aa7a5248c6e3e822cb1ac354dee295df90b2a | Patch |
| https://github.com/directus/directus/pull/26485 | Issue Tracking |
| https://github.com/directus/directus/releases/tag/v11.14.1 | Product Release Notes |
| https://github.com/directus/directus/security/advisories/GHSA-jr94-gj3h-c8rf | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-02-12 22:16
Updated : 2026-02-20 21:09
NVD link : CVE-2026-26185
Mitre link : CVE-2026-26185
CVE.ORG link : CVE-2026-26185
JSON object : View
Products Affected
monospace
- directus
CWE
CWE-203
Observable Discrepancy
