CVE-2026-35410Incomplete List of Disallowed Inputs in Directus

Severity
6.1MEDIUMNVD
EPSS
0.0%
top 88.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
Latest updateApr 4
PublishedApr 6

Description

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.1, an open redirect vulnerability exists in the login redirection logic. The isLoginRedirectAllowed function fails to correctly identify certain malformed URLs as external, allowing attackers to bypass redirect allow-list validation and redirect users to arbitrary external domains upon successful authentication. This vulnerability is fixed in 11.16.1.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

Affected Packages2 packages

CVEListV5directus/directus< 11.16.1
npmdirectus/directus< 11.16.1

🔴Vulnerability Details

2
GHSA
Directus: Open Redirect via Parser Bypass in OAuth2/SAML Authentication Flow2026-04-04
OSV
Directus: Open Redirect via Parser Bypass in OAuth2/SAML Authentication Flow2026-04-04

🕵️Threat Intelligence

1
Wiz
CVE-2026-35410 Impact, Exploitability, and Mitigation Steps | Wiz