Description

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.1, when GRAPHQL_INTROSPECTION=false is configured, Directus correctly blocks standard GraphQL introspection queries (__schema, __type). However, the server_specs_graphql resolver on the /graphql/system endpoint returns an equivalent SDL representation of the schema and was not subject to the same restriction. This allowed the introspection control to be bypassed, exposing schema structure (collection names, field names, types, and relationships) to unauthenticated users at the public permission level, and to authenticated users at their permitted permission level. This vulnerability is fixed in 11.16.1.

INFO

Published Date :

2026-04-06T21:34:32.683Z

Last Modified :

2026-04-08T14:05:44.361Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-35413 vulnerability.

Vendors Products
Directus
  • Directus
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-35413.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact