{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T23:18:30.195","vulnerabilities":[{"cve":{"id":"CVE-2026-26185","sourceIdentifier":"security-advisories@github.com","published":"2026-02-12T22:16:07.100","lastModified":"2026-02-20T21:09:03.123","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Directus is a real-time API and App dashboard for managing SQL database content. Before 11.14.1, a timing-based user enumeration vulnerability exists in the password reset functionality. When an invalid reset_url parameter is provided, the response time differs by approximately 500ms between existing and non-existing users, enabling reliable user enumeration. This vulnerability is fixed in 11.14.1."},{"lang":"es","value":"Directus es una API en tiempo real y un panel de control de aplicaciones para gestionar contenido de bases de datos SQL. Antes de 11.14.1, existe una vulnerabilidad de enumeración de usuarios basada en tiempo en la funcionalidad de restablecimiento de contraseña. Cuando se proporciona un parámetro reset_url no válido, el tiempo de respuesta difiere en aproximadamente 500 ms entre usuarios existentes y no existentes, lo que permite una enumeración de usuarios fiable. Esta vulnerabilidad se ha corregido en 11.14.1."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-203"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*","versionEndExcluding":"11.15.0","matchCriteriaId":"FF40998A-BAB1-4E2B-8DBA-3521985A8F04"}]}]}],"references":[{"url":"https://github.com/directus/directus/commit/e69aa7a5248c6e3e822cb1ac354dee295df90b2a","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/directus/directus/pull/26485","source":"security-advisories@github.com","tags":["Issue Tracking"]},{"url":"https://github.com/directus/directus/releases/tag/v11.14.1","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/directus/directus/security/advisories/GHSA-jr94-gj3h-c8rf","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}