VYPR
Moderate severityNVD Advisory· Published Jul 14, 2025· Updated Jul 15, 2025

Directus doesn't redact sensitive user data when logging via event hooks

CVE-2025-53885

Description

Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.0.0 and prior to version 11.9.0, when using Directus Flows to handle CRUD events for users it is possible to log the incoming data to console using the "Log to Console" operation and a template string. Malicious admins can log sensitive data from other users when they are created or updated. Version 11.9.0 contains a fix for the issue. As a workaround, avoid logging sensitive data to the console outside the context of development.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
directusnpm
>= 9.0.0, < 11.9.011.9.0

Affected products

1

Patches

1
859f664f56fb

Improve redaction in Flows' Log to Console operation (#25355)

https://github.com/directus/directusBrainslugJun 25, 2025via ghsa
2 files changed · +28 1
  • api/src/flows.ts+23 1 modified
    @@ -429,10 +429,32 @@ class FlowManager {
     
     		const handler = this.operations.get(operation.type)!;
     
    +		let optionData = keyedData;
    +
    +		if (operation.type === 'log') {
    +			optionData = redactObject(
    +				keyedData,
    +				{
    +					keys: [
    +						['**', 'headers', 'authorization'],
    +						['**', 'headers', 'cookie'],
    +						['**', 'query', 'access_token'],
    +						['**', 'payload', 'password'],
    +						['**', 'payload', 'token'],
    +						['**', 'payload', 'tfa_secret'],
    +						['**', 'payload', 'external_identifier'],
    +						['**', 'payload', 'auth_data'],
    +					],
    +					values: this.envs,
    +				},
    +				getRedactedString,
    +			);
    +		}
    +
     		let options = operation.options;
     
     		try {
    -			options = applyOptionsData(options, keyedData);
    +			options = applyOptionsData(options, optionData);
     
     			let result = await handler(options, {
     				services,
    
  • .changeset/tame-ears-doubt.md+5 0 added
    @@ -0,0 +1,5 @@
    +---
    +'@directus/api': patch
    +---
    +
    +Improved redaction in Flows' Log to Console operation
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.