High severity8.5NVD Advisory· Published Apr 9, 2026· Updated Apr 14, 2026
CVE-2026-39942
CVE-2026-39942
Description
Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, the PATCH /files/{id} endpoint accepts a user-controlled filename_disk parameter. By setting this value to match the storage path of another user's file, an attacker can overwrite that file's content while manipulating metadata fields such as uploaded_by to obscure the tampering. This vulnerability is fixed in 11.17.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
directusnpm | < 11.17.0 | 11.17.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-393c-p46r-7c95ghsaADVISORY
- github.com/directus/directus/security/advisories/GHSA-393c-p46r-7c95nvdMitigationVendor AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-39942ghsaADVISORY
- github.com/directus/directus/releases/tag/v11.17.0nvdProductRelease NotesWEB
News mentions
0No linked articles in our index yet.