GHSA-6q22-g298-grjh
JavaScript Analyse et atténuation des vulnérabilités

Summary

The GraphQL specification permits a single query to repeat the same field multiple times using aliases, with each alias resolved independently by default. Directus did not deduplicate resolver invocations within a single request, meaning each alias triggered a full, independent execution of the underlying resolver. The health check resolver ran all backend checks (database connectivity, cache, storage writes, and SMTP verification) on every invocation. Combined with unauthenticated access to the system GraphQL endpoint, this allowed an attacker to amplify resource consumption significantly from a single HTTP request, exhausting the database connection pool, storage I/O, and SMTP connections.

Fix

A request-scoped resolver deduplication mechanism was introduced and applied broadly across all GraphQL read resolvers, both system and items endpoints. When multiple aliases in a single request invoke the same resolver with identical arguments, only the first call executes; all subsequent aliases share its result. This eliminates the amplification factor regardless of how many aliases an attacker includes in a query.

Impact

  • Service degradation or outage: Database connection pool exhaustion prevents all Directus operations for all users
  • Storage I/O saturation: Concurrent file writes can overwhelm disk I/O
  • SMTP resource exhaustion: Concurrent SMTP verification calls may overwhelm the mail server
  • No authentication required: Any network-accessible attacker can trigger this condition
  • Single-request impact: A single request is sufficient to cause significant resource consumption

Credit

This vulnerability was discovered and reported by bugbunny.ai.


SourceNVD

Apparenté JavaScript Vulnérabilités:

Identifiant CVE

Sévérité

Score

Technologies

Nom du composant

Exploit CISA KEV

A corrigé

Date de publication

CVE-2026-35442HIGH8.1
  • JavaScriptJavaScript
  • directus
NonOuiApr 06, 2026
CVE-2026-35412HIGH7.1
  • JavaScriptJavaScript
  • directus
NonOuiApr 06, 2026
CVE-2026-35441MEDIUM6.5
  • JavaScriptJavaScript
  • directus
NonOuiApr 06, 2026
CVE-2026-35413MEDIUM5.3
  • JavaScriptJavaScript
  • directus
NonOuiApr 06, 2026
CVE-2026-35411MEDIUM4.3
  • JavaScriptJavaScript
  • directus
NonOuiApr 06, 2026

Évaluation gratuite des vulnérabilités

Évaluez votre posture de sécurité dans le cloud

Évaluez vos pratiques de sécurité cloud dans 9 domaines de sécurité pour évaluer votre niveau de risque et identifier les failles dans vos défenses.

Demander une évaluation

Obtenez une démo personnalisée

Prêt(e) à voir Wiz en action ?

"La meilleure expérience utilisateur que j’ai jamais vue, offre une visibilité totale sur les workloads cloud."
David EstlickRSSI
"Wiz fournit une interface unique pour voir ce qui se passe dans nos environnements cloud."
Adam FletcherChef du service de sécurité
"Nous savons que si Wiz identifie quelque chose comme critique, c’est qu’il l’est réellement."
Greg PoniatowskiResponsable de la gestion des menaces et des vulnérabilités