PT-2026-30328 · Npm · Directus
Published
2026-04-04
·
Updated
2026-04-04
·
CVE-2026-35411
CVSS v3.1
4.3
Medium
| AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
Summary
Directus is vulnerable to an Open Redirect via the redirect query parameter on the
/admin/tfa-setup page. When an administrator who has not yet configured Two-Factor Authentication (2FA) visits a crafted URL, they are presented with the legitimate Directus 2FA setup page. After completing the setup process, the application redirects the user to the attacker-controlled URL specified in the redirect parameter without any validation.This vulnerability could be used in phishing attacks targeting Directus administrators, as the initial interaction occurs on a trusted domain.
Credits
Discovered by Neo by ProjectDiscovery (https://neo.projectdiscovery.io/)
Fix
Open Redirect
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Directus