CVE-2026-26185 PUBLISHED

Directus Affected by User Enumeration via Password Reset Timing Attack

Assigner: GitHub_M
Reserved: 11.02.2026 Published: 12.02.2026 Updated: 12.02.2026

Directus is a real-time API and App dashboard for managing SQL database content. Before 11.14.1, a timing-based user enumeration vulnerability exists in the password reset functionality. When an invalid reset_url parameter is provided, the response time differs by approximately 500ms between existing and non-existing users, enabling reliable user enumeration. This vulnerability is fixed in 11.14.1.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS Score: 5.3

Product Status

Vendor directus
Product directus
Versions
  • Version < 11.14.1 is affected
Vendor directus
Product @directus/api
Versions
  • Version < 32.2.0 is affected

References

Problem Types

  • CWE-203: Observable Discrepancy CWE