A broken access control vulnerability was identified in the Directus file management API that allows authenticated users to overwrite files belonging to other users by manipulating the filename_disk parameter.
The PATCH /files/{id} endpoint accepts a user-controlled filename_disk parameter. By setting this value to match the storage path of another user's file, an attacker can overwrite that file's content while manipulating metadata fields such as uploaded_by to obscure the tampering.
The filename_disk parameter should be treated as a server-controlled value. Uniqueness of storage paths must be enforced server-side, and filename_disk should be excluded from the fields users are permitted to update directly.
{
"severity": "HIGH",
"github_reviewed": true,
"nvd_published_at": "2026-04-09T17:16:29Z",
"cwe_ids": [
"CWE-284",
"CWE-639",
"CWE-915"
],
"github_reviewed_at": "2026-04-04T06:06:39Z"
}