CVE-2025-30351: Suspended Directus user can continue to use session token to access API
3.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.11765%
CWE
Published
3/26/2025
Updated
3/27/2025
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| directus | npm | >= 10.10.0, < 11.15.0 | 11.15.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing user status checks during session token validation. While the actual patch adds session clearing mechanisms (clearUserSessions) and accountability tracking, the core vulnerability exists in verifySessionJWT which wasn't modified in the provided diff but is explicitly called out in the advisory. Runtime detection would focus on the token verification flow where user status isn't validated, making verifySessionJWT the primary vulnerable function visible in call stacks during exploitation.