CVE-2024-54151

Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 11.0.0 and prior to version 11.3.0, when setting `WEBSOCKETS_GRAPHQL_AUTH` or `WEBSOCKETS_REST_AUTH` to "public", an unauthenticated user is able to do any of the supported operations (CRUD, subscriptions) with full admin privileges. This impacts any Directus instance that has either `WEBSOCKETS_GRAPHQL_AUTH` or `WEBSOCKETS_REST_AUTH` set to `public` allowing unauthenticated users to subscribe for changes on any collection or do REST CRUD operations on user defined collections ignoring permissions. Version 11.3.0 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*

History

18 Nov 2025, 21:39

Type Values Removed Values Added
References () https://github.com/directus/directus/commit/ce0397d16cf767b5293cd57f626c5349b5732a21 - () https://github.com/directus/directus/commit/ce0397d16cf767b5293cd57f626c5349b5732a21 - Patch
References () https://github.com/directus/directus/security/advisories/GHSA-849r-qrwj-8rv4 - () https://github.com/directus/directus/security/advisories/GHSA-849r-qrwj-8rv4 - Exploit, Vendor Advisory
First Time Monospace
Monospace directus
CPE cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*
CWE NVD-CWE-noinfo

Information

Published : 2024-12-09 21:15

Updated : 2025-11-18 21:39


NVD link : CVE-2024-54151

Mitre link : CVE-2024-54151

CVE.ORG link : CVE-2024-54151


JSON object : View

Products Affected

monospace

  • directus
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-noinfo