Vulnerability Description
Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.0.0 and prior to version 11.9.0, the exact Directus version number is incorrectly being used as OpenAPI Spec version this means that it is being exposed by the `/server/specs/oas` endpoint without authentication. With the exact version information a malicious attacker can look for known vulnerabilities in Directus core or any of its shipped dependencies in that specific running version. Version 11.9.0 fixes the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Monospace | Directus | >= 9.0.0, < 11.9.0 |
Related Weaknesses (CWE)
References
- https://github.com/directus/directus/commit/e74f3e4e92edc33b5f83eefb001a3d2a85afPatch
- https://github.com/directus/directus/pull/25353Patch
- https://github.com/directus/directus/releases/tag/v11.9.0Release Notes
- https://github.com/directus/directus/security/advisories/GHSA-rmjh-cf9q-pv7qThird Party Advisory
FAQ
What is CVE-2025-53887?
CVE-2025-53887 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.0.0 and prior to version 11.9.0, the exact Directus version number is incorrectly being used as O...
How severe is CVE-2025-53887?
CVE-2025-53887 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-53887?
Check the references section above for vendor advisories and patch information. Affected products include: Monospace Directus.