Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, the PATCH /files/{id} endpoint accepts a user-controlled filename_disk parameter. By setting this value to match the storage path of another user's file, an attacker can overwrite that file's content while manipulating metadata fields such as uploaded_by to obscure the tampering. This vulnerability is fixed in 11.17.0.

Project Subscriptions

No data.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-393c-p46r-7c95 Directus: Path Traversal and Broken Access Control in File Management API
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 09 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, the PATCH /files/{id} endpoint accepts a user-controlled filename_disk parameter. By setting this value to match the storage path of another user's file, an attacker can overwrite that file's content while manipulating metadata fields such as uploaded_by to obscure the tampering. This vulnerability is fixed in 11.17.0.
Title Directus has a Path Traversal and Broken Access Control in File Management API
Weaknesses CWE-284
CWE-639
References
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-09T19:37:24.389Z

Reserved: 2026-04-07T22:40:33.820Z

Link: CVE-2026-39942

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-09T17:16:29.813

Modified: 2026-04-09T17:16:29.813

Link: CVE-2026-39942

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses