PT-2026-30332 · Npm · Directus
Published
2026-04-04
·
Updated
2026-04-04
·
CVE-2026-35442
CVSS v3.1
8.1
High
| AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
Summary
Aggregate functions (
min, max) applied to fields with the conceal special type incorrectly return raw database values instead of the masked placeholder. When combined with groupBy, any authenticated user with read access to the affected collection can extract concealed field values, including static API tokens and two-factor authentication secrets from directus users.Details
Fields marked with
conceal are protected by payload processing logic that replaces real values with a masked placeholder on read. This protection works correctly for standard item queries, but aggregate query results are structured differently, operations are nested under their function name rather than appearing as flat field keys. The masking logic does not account for this nested structure, causing it to silently skip concealed fields in aggregate responses and return their raw values to the client.Impact
-
Account Takeover An authenticated attacker can harvest static API tokens for all users, including administrators, enabling immediate authentication as any account without credentials.
-
2FA Bypass TOTP seeds stored in directus users can similarly be extracted, allowing an attacker to bypass two-factor authentication for any account.
Fix
Information Disclosure
Incorrect Authorization
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Directus