CVE-2025-64747

Directus is a real-time API and App dashboard for managing SQL database content. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 11.13.0 that allows users with `upload files` and `edit item` permissions to inject malicious JavaScript through the Block Editor interface. Attackers can bypass Content Security Policy (CSP) restrictions by combining file uploads with iframe srcdoc attributes, resulting in persistent XSS execution. Version 11.13.0 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*

History

19 Nov 2025, 14:49

Type Values Removed Values Added
References () https://github.com/directus/directus/commit/d23525317f0780f04aa1fe7a99171a358e43cb2e - () https://github.com/directus/directus/commit/d23525317f0780f04aa1fe7a99171a358e43cb2e - Patch
References () https://github.com/directus/directus/security/advisories/GHSA-vv2v-pw69-8crf - () https://github.com/directus/directus/security/advisories/GHSA-vv2v-pw69-8crf - Exploit, Vendor Advisory
First Time Monospace
Monospace directus
CPE cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*

13 Nov 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-13 22:15

Updated : 2025-11-19 14:49


NVD link : CVE-2025-64747

Mitre link : CVE-2025-64747

CVE.ORG link : CVE-2025-64747


JSON object : View

Products Affected

monospace

  • directus
CWE
CWE-20

Improper Input Validation

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')