{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-64747","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-11-10T22:29:34.872Z","datePublished":"2025-11-13T21:13:42.627Z","dateUpdated":"2025-11-13T21:33:55.297Z"},"containers":{"cna":{"title":"Directus Vulnerable to Stored Cross-site Scripting","problemTypes":[{"descriptions":[{"cweId":"CWE-20","lang":"en","description":"CWE-20: Improper Input Validation","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-79","lang":"en","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":5.5,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L","version":"3.1"}}],"references":[{"name":"https://github.com/directus/directus/security/advisories/GHSA-vv2v-pw69-8crf","tags":["x_refsource_CONFIRM"],"url":"https://github.com/directus/directus/security/advisories/GHSA-vv2v-pw69-8crf"},{"name":"https://github.com/directus/directus/commit/d23525317f0780f04aa1fe7a99171a358e43cb2e","tags":["x_refsource_MISC"],"url":"https://github.com/directus/directus/commit/d23525317f0780f04aa1fe7a99171a358e43cb2e"}],"affected":[{"vendor":"directus","product":"directus","versions":[{"version":"< 11.13.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-11-13T21:13:42.627Z"},"descriptions":[{"lang":"en","value":"Directus is a real-time API and App dashboard for managing SQL database content. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 11.13.0 that allows users with `upload files` and `edit item` permissions to inject malicious JavaScript through the Block Editor interface. Attackers can bypass Content Security Policy (CSP) restrictions by combining file uploads with iframe srcdoc attributes, resulting in persistent XSS execution. Version 11.13.0 fixes the issue."}],"source":{"advisory":"GHSA-vv2v-pw69-8crf","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-11-13T21:33:34.130224Z","id":"CVE-2025-64747","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-11-13T21:33:55.297Z"}}]}}