Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-26185

CVE-2026-26185: Directus Information Disclosure Flaw

CVE-2026-26185 is a timing-based user enumeration vulnerability in Directus that exposes user information through password reset timing differences. This article covers technical details, affected versions, and patches.

Published: February 13, 2026

CVE-2026-26185 Overview

CVE-2026-26185 is a timing-based user enumeration vulnerability discovered in Directus, a real-time API and App dashboard for managing SQL database content. Before version 11.14.1, the password reset functionality exhibits a timing side-channel that allows attackers to determine whether a given email address is registered in the system. When an invalid reset_url parameter is provided, the response time differs by approximately 500ms between existing and non-existing users, enabling reliable user enumeration attacks.

Critical Impact

Attackers can enumerate valid user accounts through the password reset endpoint, potentially facilitating targeted phishing campaigns, credential stuffing attacks, or brute-force authentication attempts against confirmed accounts.

Affected Products

  • Directus versions prior to 11.14.1
  • Directus API password reset functionality
  • Self-hosted Directus installations with exposed password reset endpoints

Discovery Timeline

  • 2026-02-12 - CVE CVE-2026-26185 published to NVD
  • 2026-02-12 - Last updated in NVD database

Technical Details for CVE-2026-26185

Vulnerability Analysis

This vulnerability falls under CWE-203 (Observable Discrepancy), commonly known as a timing attack or side-channel vulnerability. The root issue lies in the order of operations within the password reset flow in Directus. The application performs URL validation and user lookup in a sequence that creates a measurable timing difference depending on whether a user exists in the database.

When a password reset request is submitted with an invalid reset_url parameter, the system's response timing reveals information about user existence. If the user exists, additional processing occurs (including the 500ms stall time implementation) before the error is thrown, whereas non-existent users trigger an earlier exit path. This timing differential of approximately 500ms is significant enough to be reliably measured over network requests.

Root Cause

The vulnerability originates from the placement of the URL validation check relative to the user lookup operation. In the vulnerable code path, the application first retrieves the user by email address, then validates whether the provided URL is in the allowed list. This ordering means that the stall time mechanism (designed to prevent timing attacks) is applied inconsistently—only executing after a user is found, not before the URL validation error is thrown.

Attack Vector

An attacker can exploit this vulnerability remotely without authentication by sending password reset requests with a deliberately invalid reset_url parameter paired with target email addresses. By measuring response times across multiple requests, the attacker can reliably determine which email addresses correspond to registered users. This network-based attack requires no privileges or user interaction.

typescript
// Security patch from api/src/services/users.ts
// Source: https://github.com/directus/directus/commit/e69aa7a5248c6e3e822cb1ac354dee295df90b2a

 		const STALL_TIME = 500;
 		const timeStart = performance.now();
 
+		if (url && isUrlAllowed(url, env['PASSWORD_RESET_URL_ALLOW_LIST'] as string) === false) {
+			throw new InvalidPayloadError({ reason: `URL "${url}" can't be used to reset passwords` });
+		}
+
 		const user = await this.getUserByEmail(email);
 
 		if (user?.status !== 'active') {
 			await stall(STALL_TIME, timeStart);
 			throw new ForbiddenError();
 		}
 
-		if (url && isUrlAllowed(url, env['PASSWORD_RESET_URL_ALLOW_LIST'] as string) === false) {
-			throw new InvalidPayloadError({ reason: `URL "${url}" can't be used to reset passwords` });
-		}
-
 		const mailService = new MailService({
 			schema: this.schema,
 			knex: this.knex,

The fix moves the URL validation check to occur before the user lookup, ensuring that invalid URL requests are rejected immediately with consistent timing regardless of whether the user exists.

Detection Methods for CVE-2026-26185

Indicators of Compromise

  • Unusually high volume of password reset requests from single IP addresses or IP ranges
  • Sequential password reset attempts targeting different email addresses in rapid succession
  • Password reset requests containing obviously invalid reset_url parameters
  • Correlation between enumeration activity and subsequent authentication attempts against discovered accounts

Detection Strategies

  • Implement rate limiting on the password reset endpoint and alert on threshold breaches
  • Monitor for patterns of password reset requests that use the same invalid URL across multiple email addresses
  • Deploy anomaly detection to identify automated enumeration behavior based on request timing patterns
  • Review web application firewall (WAF) logs for suspicious POST requests to /auth/password/request endpoints

Monitoring Recommendations

  • Enable detailed logging for all password reset requests including source IP, timestamp, and provided parameters
  • Set up alerts for password reset request rates exceeding normal baseline thresholds
  • Monitor response time metrics on authentication-related endpoints to detect potential timing attack reconnaissance
  • Correlate password reset activity with subsequent login attempts to identify potential attack chains

How to Mitigate CVE-2026-26185

Immediate Actions Required

  • Upgrade Directus to version 11.14.1 or later immediately
  • Review access logs for evidence of exploitation attempts against the password reset endpoint
  • Implement or strengthen rate limiting on authentication-related API endpoints
  • Consider temporarily restricting access to password reset functionality from untrusted networks if immediate patching is not possible

Patch Information

The vulnerability is fixed in Directus version 11.14.1. The patch reorders the URL validation logic to execute before the user lookup, ensuring consistent response timing regardless of user existence. Organizations should upgrade to version 11.14.1 or later to remediate this vulnerability.

For detailed patch information, refer to:

  • GitHub Security Advisory
  • GitHub Release v11.14.1
  • Pull Request #26485

Workarounds

  • Implement a web application firewall (WAF) rule to rate limit requests to the password reset endpoint
  • Deploy a reverse proxy with consistent response time delays for all authentication-related endpoints
  • Restrict password reset functionality to internal networks or VPN-only access until patching is complete
  • Enable CAPTCHA or similar challenge-response mechanisms on the password reset form to impede automated enumeration
bash
# Example: Nginx rate limiting configuration for password reset endpoint
limit_req_zone $binary_remote_addr zone=password_reset:10m rate=5r/m;

location /auth/password/request {
    limit_req zone=password_reset burst=2 nodelay;
    limit_req_status 429;
    proxy_pass http://directus_backend;
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechDirectus

  • SeverityMEDIUM

  • CVSS Score5.3

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-203
  • Technical References
  • GitHub Commit Log

  • GitHub Pull Request

  • GitHub Release Note

  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-39943: Directus Information Disclosure Flaw

  • CVE-2026-35413: Directus GraphQL Introspection Bypass

  • CVE-2026-35442: Directus Information Disclosure Flaw

  • CVE-2026-39942: Directus Privilege Escalation Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English