Description
Directus is a real-time API and App dashboard for managing SQL database content. Directus >=9.23.0, <=v10.5.3 improperly handles _in, _nin operators. It evaluates empty arrays as valid so expressions like {"role": {"_in": $CURRENT_USER.some_field}} would evaluate to true allowing the request to pass. This results in Broken Access Control because the rule fails to do what it was intended to do: Pass rule if **field** matches any of the **values**. This vulnerability is fixed in 10.6.0.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2368 | Directus is a real-time API and App dashboard for managing SQL database content. Directus >=9.23.0, <=v10.5.3 improperly handles _in, _nin operators. It evaluates empty arrays as valid so expressions like {"role": {"_in": $CURRENT_USER.some_field}} would evaluate to true allowing the request to pass. This results in Broken Access Control because the rule fails to do what it was intended to do: Pass rule if **field** matches any of the **values**. This vulnerability is fixed in 10.6.0. |
Github GHSA |
GHSA-hxgm-ghmv-xjjm | Directus incorrectly handles `_in` filter |
References
History
Thu, 04 Sep 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Monospace
Monospace directus |
|
| CPEs | cpe:2.3:a:monospace:directus:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Monospace
Monospace directus |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T04:26:16.090Z
Reserved: 2024-06-27T18:44:13.039Z
Link: CVE-2024-39701
Updated: 2024-08-02T04:26:16.090Z
Status : Analyzed
Published: 2024-07-08T17:15:11.773
Modified: 2025-09-04T14:43:40.310
Link: CVE-2024-39701
No data.
OpenCVE Enrichment
Updated: 2025-07-13T11:15:09Z
Weaknesses
EUVD
Github GHSA