CVE-2025-27089
JavaScript vulnerability analysis and mitigation

Overview

Directus, a real-time API and App dashboard for managing SQL database content, disclosed a vulnerability (CVE-2025-27089) on February 19, 2025. The vulnerability affects versions from 11.0.0 to 11.1.2 and involves incorrect permission handling when dealing with overlapping policies for the update action (NVD, GitHub Advisory).

Technical details

The vulnerability stems from improper permission validation when handling overlapping policies. When two policies allow access to different fields (e.g., one policy allowing update access to field_a if id == 1 and another allowing access to field_b if id == 2), the system incorrectly allows users to update the superset of fields allowed by any of the policies, rather than properly checking access permissions against the specific item they apply to (GitHub Advisory). The vulnerability has been assigned a CVSS v3.1 base score of 5.4 (Medium) with vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N (NVD).

Impact

The vulnerability allows users to gain update access to unintended fields, potentially including sensitive data such as password fields for user accounts. This could lead to unauthorized modification of data and potential privilege escalation (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 11.1.2. All users are advised to upgrade to this version or later. There are no known workarounds for this vulnerability (GitHub Release, GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management