CVE-2023-28443
JavaScript vulnerability analysis and mitigation

Overview

Directus, a real-time API and App dashboard for managing SQL database content, was found to have a security vulnerability (CVE-2023-28443) where the directus_refresh_token was not properly redacted from log outputs. This vulnerability was present in versions prior to 9.23.3 and was discovered and disclosed on March 23, 2023. The issue affected all installations of Directus before version 9.23.3 (NVD, GitHub Advisory).

Technical details

The vulnerability stems from improper redaction of sensitive information in log files. The directus_refresh_token was exposed in log outputs when LOG_STYLE was set to "raw". This issue was particularly concerning as the refresh token could be used to obtain access tokens and impersonate users. The vulnerability received a CVSS v3.1 base score of 5.5 MEDIUM (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) according to NVD's assessment (NVD).

Impact

The exposure of refresh tokens in log files could allow attackers with access to logs to impersonate legitimate users without their permission. This created significant accountability and non-repudiation issues, as actions taken in the application could no longer be confidently attributed to the actual user. Potential malicious activities could include unauthorized data deletion or content manipulation under the guise of legitimate users (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in Directus version 9.23.3. The fix involved implementing proper redaction of sensitive tokens in the logging system. Organizations using affected versions should upgrade to version 9.23.3 or later to address this security issue (NVD, GitHub Patch).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67731HIGH8.7
  • JavaScriptJavaScript
  • servify-express
NoYesDec 12, 2025
CVE-2025-67718HIGH8.7
  • JavaScriptJavaScript
  • formio
NoYesDec 11, 2025
CVE-2025-65513HIGH7.5
  • JavaScriptJavaScript
  • mcp-fetch-server
NoNoDec 09, 2025
CVE-2025-67716MEDIUM5.7
  • JavaScriptJavaScript
  • @auth0/nextjs-auth0
NoYesDec 11, 2025
CVE-2025-67490MEDIUM5.4
  • JavaScriptJavaScript
  • @auth0/nextjs-auth0
NoYesDec 10, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management