Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jr94-gj3h-c8rf | Directus Vulnerable to User Enumeration via Password Reset Timing Attack |
Fri, 20 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Monospace
Monospace directus |
|
| CPEs | cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Monospace
Monospace directus |
Fri, 13 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Directus
Directus directus |
|
| Vendors & Products |
Directus
Directus directus |
Fri, 13 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Directus is a real-time API and App dashboard for managing SQL database content. Before 11.14.1, a timing-based user enumeration vulnerability exists in the password reset functionality. When an invalid reset_url parameter is provided, the response time differs by approximately 500ms between existing and non-existing users, enabling reliable user enumeration. This vulnerability is fixed in 11.14.1. | |
| Title | Directus Affected by User Enumeration via Password Reset Timing Attack | |
| Weaknesses | CWE-203 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-13T15:59:06.336Z
Reserved: 2026-02-11T19:56:24.811Z
Link: CVE-2026-26185
Updated: 2026-02-13T15:59:02.692Z
Status : Analyzed
Published: 2026-02-12T22:16:07.100
Modified: 2026-02-20T21:09:03.123
Link: CVE-2026-26185
No data.
OpenCVE Enrichment
Updated: 2026-04-18T12:45:45Z
Github GHSA