Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2514 articles · 104574 vulns · 38/41 feeds (7d)
← Back to list
6.5
CVE-2026-35441PATCHED
directus · directus

Directus Affected by GraphQL Alias Amplification Denial-of-Service Due to Missing Query Cost/Complexity Limits

Description

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, Directus' GraphQL endpoints (/graphql and /graphql/system) did not deduplicate resolver invocations within a single request. An authenticated user could exploit GraphQL aliasing to repeat an expensive relational query many times in a single request, forcing the server to execute a large number of independent complex database queries concurrently, multiplying database load linearly with the number of aliases. The existing token limit on GraphQL queries still permitted enough aliases for significant resource exhaustion, while the relational depth limit applied per alias without reducing the total number executed. Rate limiting is disabled by default, meaning no built-in throttle prevented this from causing CPU, memory, and I/O exhaustion that could degrade or crash the service. Any authenticated user, including those with minimal read-only permissions, could trigger this condition. This vulnerability is fixed in 11.17.0.

Affected Products

VendorProductVersions
directusdirectus< 11.17.0, 11.16.x

References

  • https://github.com/directus/directus/security/advisories/GHSA-ph52-67fq-75wj(x_refsource_CONFIRM)

Related News (1 articles)

Tier C
VulDB5h ago
CVE-2026-35441 | Directus up to 11.16.x GraphQL /graphql resource consumption
→ No new info (linked only)
CVSS 3.16.5 HIGH
VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CISA KEV❌ No
Actively exploited❌ No
Patch available
directus@11.17.0
CWECWE-400, CWE-770
PublishedApr 4, 2026
Last enriched4h agov2
Tags
GHSA-ph52-67fq-75wjnpmCVE-2026-35441
Trending Score27
Source articles1
Independent1
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-35410EXP
Directus has an Open Redirect via Parser Bypass in OAuth2/SAML Authentication Flow
Trending: 49
MEDIUMCVE-2026-35411EXP
Directus is an Open Redirect in Admin 2FA Setup Page
Trending: 42
MEDIUMCVE-2026-35412EXP
Directus has a TUS Upload Authorization Bypass Allows Arbitrary File Overwrite
Trending: 42
CRITICALCVE-2026-35409
Directus has a SSRF Protection Bypass via IPv4-Mapped IPv6 Addresses in File Import
Trending: 30
HIGHCVE-2026-35413
Directus GraphQL Schema SDL Disclosure Setting
Trending: 27

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 4, 2026
Discovered by ZDM
Apr 4, 2026
Patch Available
Apr 6, 2026
Updated: affectedVersions, severity, tags
Apr 6, 2026

Version History

v2
Last enriched 4h ago
v2Tier C4h ago

Updated affected versions to include 11.16.x, changed severity to HIGH, and added CVE-2026-35441 as a new tag.

affectedVersionsseveritytags
via VulDB
v12d ago

Initial creation