Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. directus
  4. ›
  5. CVE-2025-53886

CVE-2025-53886: Directus tokens are not redacted in flow logs, exposing session credentials to all admin

July 15, 2025

When using Directus Flows with the WebHook trigger, all incoming request details are logged including security sensitive data like access and refresh tokens in cookies.

References

  • github.com/advisories/GHSA-f24x-rm6g-3w5v
  • github.com/directus/directus
  • github.com/directus/directus/commit/859f664f56fb50401c407b095889cea38ff580e5
  • github.com/directus/directus/releases/tag/v11.9.0
  • github.com/directus/directus/security/advisories/GHSA-f24x-rm6g-3w5v
  • nvd.nist.gov/vuln/detail/CVE-2025-53886

Code Behaviors & Features

Detect and mitigate CVE-2025-53886 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 11.9.0

Fixed versions

  • 11.9.0

Solution

Upgrade to version 11.9.0 or above.

Impact 4.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
  • CWE-532: Insertion of Sensitive Information into Log File

Source file

npm/directus/CVE-2025-53886.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:18:35 +0000.