Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2514 articles · 104575 vulns · 38/41 feeds (7d)
← Back to list
7.1
CVE-2026-35412EXPLOITEDPATCHED
directus · directus

Directus has a TUS Upload Authorization Bypass Allows Arbitrary File Overwrite

Description

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.1, Directus' TUS resumable upload endpoint (/files/tus) allows any authenticated user with basic file upload permissions to overwrite arbitrary existing files by UUID. The TUS controller performs only collection-level authorization checks, verifying the user has some permission on directus_files, but never validates item-level access to the specific file being replaced. As a result, row-level permission rules (e.g., "users can only update their own files") are completely bypassed via the TUS path while being correctly enforced on the standard REST upload path. This vulnerability is fixed in 11.16.1.

Affected Products

VendorProductVersions
directusdirectus< 11.16.1, 11.16.0

References

  • https://github.com/directus/directus/security/advisories/GHSA-qqmv-5p3g-px89(x_refsource_CONFIRM)

Related News (1 articles)

Tier C
VulDB5h ago
CVE-2026-35412 | Directus up to 11.16.0 /files/tus authorization
→ No new info (linked only)
CVSS 3.17.1 MEDIUM
VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
null
CWECWE-863
PublishedApr 4, 2026
Last enriched4h agov2
Tags
GHSA-qqmv-5p3g-px89npm
Trending Score42
Source articles1
Independent1
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-35410EXP
Directus has an Open Redirect via Parser Bypass in OAuth2/SAML Authentication Flow
Trending: 49
MEDIUMCVE-2026-35411EXP
Directus is an Open Redirect in Admin 2FA Setup Page
Trending: 42
CRITICALCVE-2026-35409
Directus has a SSRF Protection Bypass via IPv4-Mapped IPv6 Addresses in File Import
Trending: 30
HIGHCVE-2026-35441
Directus Affected by GraphQL Alias Amplification Denial-of-Service Due to Missing Query Cost/Complexity Limits
Trending: 27
HIGHCVE-2026-35413
Directus GraphQL Schema SDL Disclosure Setting
Trending: 27

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 4, 2026
Discovered by ZDM
Apr 4, 2026
Actively Exploited
Apr 6, 2026
Patch Available
Apr 6, 2026
Updated: affectedVersions, severity, activelyExploited, patchAvailable
Apr 6, 2026

Version History

v2
Last enriched 4h ago
v2Tier C4h ago

Updated affected versions to include 11.16.0, changed severity to MEDIUM, and noted that no exploit exists.

affectedVersionsseverityactivelyExploitedpatchAvailable
via VulDB
v12d ago

Initial creation