CVE-2026-35409 PUBLISHED

Directus has a SSRF Protection Bypass via IPv4-Mapped IPv6 Addresses in File Import

Assigner: GitHub_M
Reserved: 02.04.2026 Published: 06.04.2026 Updated: 06.04.2026

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.0, a Server-Side Request Forgery (SSRF) protection bypass has been identified and fixed in Directus. The IP address validation mechanism used to block requests to local and private networks could be circumvented using IPv4-Mapped IPv6 address notation. This vulnerability is fixed in 11.16.0.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
CVSS Score: 7.7

Product Status

Vendor directus
Product directus
Versions
  • Version < 11.16.0 is affected

References

Problem Types

  • CWE-918: Server-Side Request Forgery (SSRF) CWE