Directus tokens are not redacted in flow logs, exposing session credentials to all admin
Moderate severity
GitHub Reviewed
Published
Jul 14, 2025
in
directus/directus
•
Updated Jul 15, 2025
Description
Published by the National Vulnerability Database
Jul 15, 2025
Published to the GitHub Advisory Database
Jul 15, 2025
Reviewed
Jul 15, 2025
Last updated
Jul 15, 2025
Summary
When using Directus Flows with the WebHook trigger, all incoming request details are logged including security sensitive data like access and refresh tokens in cookies.
Impact
Malicious admins with access to the logs can hijack the user sessions within the token expiration time of them triggering the Flow.
References