Vulnerability Details CVE-2024-54128
Directus is a real-time API and App dashboard for managing SQL database content. The Comment feature has implemented a filter to prevent users from adding restricted characters, such as HTML tags. However, this filter operates on the client-side, which can be bypassed, making the application vulnerable to HTML Injection. This vulerability is fixed in 10.13.4 and 11.2.0.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 40.7%
CVSS Severity
CVSS v3 Score 5.7
Products affected by CVE-2024-54128
-
cpe:2.3:a:monospace:directus:10.10.0
-
cpe:2.3:a:monospace:directus:10.10.1
-
cpe:2.3:a:monospace:directus:10.10.2
-
cpe:2.3:a:monospace:directus:10.10.3
-
cpe:2.3:a:monospace:directus:10.10.4
-
cpe:2.3:a:monospace:directus:10.10.5
-
cpe:2.3:a:monospace:directus:10.10.6
-
cpe:2.3:a:monospace:directus:10.10.7
-
cpe:2.3:a:monospace:directus:10.11.0
-
cpe:2.3:a:monospace:directus:10.11.1
-
cpe:2.3:a:monospace:directus:10.11.2
-
cpe:2.3:a:monospace:directus:10.12.0
-
cpe:2.3:a:monospace:directus:10.12.1
-
cpe:2.3:a:monospace:directus:10.13.0
-
cpe:2.3:a:monospace:directus:10.13.1
-
cpe:2.3:a:monospace:directus:10.13.2
-
cpe:2.3:a:monospace:directus:10.13.3
-
cpe:2.3:a:monospace:directus:11.0.0
-
cpe:2.3:a:monospace:directus:11.0.1
-
cpe:2.3:a:monospace:directus:11.0.2
-
cpe:2.3:a:monospace:directus:11.1.0
-
cpe:2.3:a:monospace:directus:11.1.1
-
cpe:2.3:a:monospace:directus:11.1.2
-
cpe:2.3:a:monospace:directus:11.2.0
-
cpe:2.3:a:monospace:directus:11.2.1