Medium severity6.5NVD Advisory· Published Apr 9, 2026· Updated Apr 14, 2026
CVE-2026-39943
CVE-2026-39943
Description
Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, Directus stores revision records (in directus_revisions) whenever items are created or updated. Due to the revision snapshot code not consistently calling the prepareDelta sanitization pipeline, sensitive fields (including user tokens, two-factor authentication secrets, external auth identifiers, auth data, stored credentials, and AI provider API keys) could be stored in plaintext within revision records. This vulnerability is fixed in 11.17.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
directusnpm | < 11.17.0 | 11.17.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-mvv8-v4jj-g47jghsaADVISORY
- github.com/directus/directus/security/advisories/GHSA-mvv8-v4jj-g47jnvdVendor AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-39943ghsaADVISORY
- github.com/directus/directus/releases/tag/v11.17.0nvdProductRelease NotesWEB
News mentions
0No linked articles in our index yet.