Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. directus
  4. ›
  5. CVE-2026-35410

CVE-2026-35410: Directus: Open Redirect via Parser Bypass in OAuth2/SAML Authentication Flow

April 4, 2026 (updated April 7, 2026)

An open redirect vulnerability exists in the login redirection logic. The isLoginRedirectAllowed function fails to correctly identify certain malformed URLs as external, allowing attackers to bypass redirect allow-list validation and redirect users to arbitrary external domains upon successful authentication.

References

  • github.com/advisories/GHSA-cf45-hxwj-4cfj
  • github.com/directus/directus
  • github.com/directus/directus/security/advisories/GHSA-cf45-hxwj-4cfj
  • nvd.nist.gov/vuln/detail/CVE-2026-35410

Code Behaviors & Features

Detect and mitigate CVE-2026-35410 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 11.16.1

Fixed versions

  • 11.16.1

Solution

Upgrade to version 11.16.1 or above.

Impact 6.1 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-184: Incomplete List of Disallowed Inputs
  • CWE-20: Improper Input Validation
  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Source file

npm/directus/CVE-2026-35410.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:17:47 +0000.