Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-8237 | Directus's webhook trigger flows can leak sensitive data |
Github GHSA |
GHSA-fm3h-p9wm-h74h | Directus's webhook trigger flows can leak sensitive data |
Tue, 26 Aug 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Monospace
Monospace directus |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Monospace
Monospace directus |
Wed, 26 Mar 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 26 Mar 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.12.0 and prior to version 11.5.0, when a Flow with the "Webhook" trigger and the "Data of Last Operation" response body encounters a ValidationError thrown by a failed condition operation, the API response includes sensitive data. This includes environmental variables, sensitive API keys, user accountability information, and operational data. This issue poses a significant security risk, as any unintended exposure of this data could lead to potential misuse. Version 11.5.0 fixes the issue. | |
| Title | Directus's webhook trigger flows can leak sensitive data | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-26T17:44:22.290Z
Reserved: 2025-03-21T14:12:06.270Z
Link: CVE-2025-30353
Updated: 2025-03-26T17:44:13.597Z
Status : Analyzed
Published: 2025-03-26T18:15:27.327
Modified: 2025-08-26T01:47:43.713
Link: CVE-2025-30353
No data.
OpenCVE Enrichment
Updated: 2025-07-12T15:26:05Z
EUVD
Github GHSA