Directus Vulnerable to User Enumeration via Password Reset Timing Attack
Moderate severity
GitHub Reviewed
Published
Feb 12, 2026
in
directus/directus
•
Updated Feb 13, 2026
Description
Published to the GitHub Advisory Database
Feb 12, 2026
Reviewed
Feb 12, 2026
Published by the National Vulnerability Database
Feb 12, 2026
Last updated
Feb 13, 2026
Summary
A timing-based user enumeration vulnerability exists in the password reset functionality. When an invalid reset_url parameter is provided, the response time differs by approximately 500ms between existing and non-existing users, enabling reliable user enumeration.
Details
The password reset endpoint implements a timing protection mechanism to prevent user enumeration; however, URL validation executes before the timing protection is applied. This allows an attacker to distinguish between valid and invalid user accounts based on response timing differences.
Impact
This vulnerability violates user privacy and may facilitate targeted phishing attacks by allowing attackers to confirm the existence of user accounts.
References