CVE-2025-64748
JavaScript vulnerability analysis and mitigation

Overview

A vulnerability in Directus, a real-time API and App dashboard for managing SQL database content, allows authenticated users to search concealed/sensitive fields when they have read permissions. The vulnerability, identified as CVE-2025-64748, affects versions prior to 11.13.0 and was disclosed on November 13, 2025 (GitHub Advisory).

Technical details

The vulnerability enables search operations on concealed fields in the directus_users collection, including sensitive data such as tokens, tfa_secret, and password fields. While the actual values remain masked (****), successful matches can be detected through returned records. The vulnerability has been assigned a CVSS v3.1 score of 6.5 (Moderate), with the following base metrics: Network attack vector, Low attack complexity, Low privileges required, No user interaction, Unchanged scope, High confidentiality impact, and No impact on integrity or availability (GitHub Advisory).

Impact

The vulnerability can lead to token enumeration, password hash matching for identifying accounts with compromised passwords, and information disclosure through confirmation of sensitive value existence. The risk is particularly significant for password fields, where attackers can cross-reference publicly available hash databases to identify vulnerable accounts. The 'Recommended Defaults' for 'App Access' grant users full read permissions to their role/user records, making all deployments using recommended settings potentially vulnerable (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Directus version 11.13.0. Users should upgrade to this version or later to address the security issue. The fix involves modifying the search functionality to prevent searching on fields marked with the 'conceal' special flag (GitHub Commit).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23744CRITICAL9.8
  • JavaScriptJavaScript
  • @mcpjam/inspector
NoYesJan 16, 2026
CVE-2026-23735HIGH8.7
  • JavaScriptJavaScript
  • graphql-modules
NoYesJan 16, 2026
GHSA-gw32-9rmw-qwwwHIGH8.4
  • JavaScriptJavaScript
  • svelte
NoYesJan 16, 2026
CVE-2026-23745HIGH8.2
  • JavaScriptJavaScript
  • argo-workflows-fips-3.6
NoYesJan 16, 2026
GHSA-38cw-85xc-xr9xMEDIUM6.8
  • JavaScriptJavaScript
  • @veramo/data-store
NoYesJan 16, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management