CVSS 3.1 Score 2.3 of 10 (low)


Published Mar 12, 2024
Updated: Mar 13, 2024
CWE ID 200
CWE ID 598


CVE-2024-28238 is a secondary vulnerability affecting Directus, a real-time API and App dashboard used for managing SQL database content. The vulnerability arises when a JSON Web Token (JWT) is passed via a GET request to the /files page. This poses a security risk as the inclusion of session tokens in URLs can be logged in various places, such as web server logs and browser history. If attackers gain access to these logs, they may hijack active user sessions, leading to unauthorized access to sensitive information or actions on behalf of the user. The issue has been addressed in version 10.10.0 of Directus, and users are advised to upgrade as there are no known workarounds for this vulnerability. The base severity of this vulnerability is rated as LOW, with a base score of 2.3 according to the CVSS:3.1 scoring system.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2024-28238 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options