Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2516 articles · 104579 vulns · 38/41 feeds (7d)
← Back to list
4.3
CVE-2026-35411EXPLOITEDPATCHED
directus · directus

Directus is an Open Redirect in Admin 2FA Setup Page

Description

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.1, Directus is vulnerable to an open redirect via the redirect query parameter on the /admin/tfa-setup page. When an administrator who has not yet configured Two-Factor Authentication (2FA) visits a crafted URL, they are presented with the legitimate Directus 2FA setup page. After completing the setup process, the application redirects the user to the attacker-controlled URL specified in the redirect parameter without any validation. This vulnerability could be used in phishing attacks targeting Directus administrators, as the initial interaction occurs on a trusted domain. This vulnerability is fixed in 11.16.1.

Affected Products

VendorProductVersions
directusdirectus< 11.16.1, 11.16.0

References

  • https://github.com/directus/directus/security/advisories/GHSA-q75c-4gmv-mg9x(x_refsource_CONFIRM)

Related News (1 articles)

Tier C
VulDB7h ago
CVE-2026-35411 | Directus up to 11.16.0 /admin/tfa-setup redirect
→ No new info (linked only)
CVSS 3.14.3 MEDIUM
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
directus@11.16.1
CWECWE-601
PublishedApr 4, 2026
Last enriched6h agov2
Tags
GHSA-q75c-4gmv-mg9xnpm
Trending Score42
Source articles1
Independent1
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-35410EXP
Directus has an Open Redirect via Parser Bypass in OAuth2/SAML Authentication Flow
Trending: 48
MEDIUMCVE-2026-35412EXP
Directus has a TUS Upload Authorization Bypass Allows Arbitrary File Overwrite
Trending: 42
CRITICALCVE-2026-35409
Directus has a SSRF Protection Bypass via IPv4-Mapped IPv6 Addresses in File Import
Trending: 30
HIGHCVE-2026-35441
Directus Affected by GraphQL Alias Amplification Denial-of-Service Due to Missing Query Cost/Complexity Limits
Trending: 27
HIGHCVE-2026-35413
Directus GraphQL Schema SDL Disclosure Setting
Trending: 27

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 4, 2026
Discovered by ZDM
Apr 4, 2026
Actively Exploited
Apr 6, 2026
Patch Available
Apr 6, 2026
Updated: affectedVersions, activelyExploited
Apr 6, 2026

Version History

v2
Last enriched 6h ago
v2Tier C6h ago

Updated affected versions to include 11.16.0, marked exploit as unavailable, and noted that the vulnerability is actively exploited.

affectedVersionsactivelyExploited
via VulDB
v12d ago

Initial creation