Directus's webhook trigger flows can leak sensitive data
Description
Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.12.0 and prior to version 11.5.0, when a Flow with the "Webhook" trigger and the "Data of Last Operation" response body encounters a ValidationError thrown by a failed condition operation, the API response includes sensitive data. This includes environmental variables, sensitive API keys, user accountability information, and operational data. This issue poses a significant security risk, as any unintended exposure of this data could lead to potential misuse. Version 11.5.0 fixes the issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
directusnpm | >= 9.12.0, < 11.5.0 | 11.5.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-fm3h-p9wm-h74hghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-30353ghsaADVISORY
- github.com/directus/directus/security/advisories/GHSA-fm3h-p9wm-h74hghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.