Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.0, a Server-Side Request Forgery (SSRF) protection bypass has been identified and fixed in Directus. The IP address validation mechanism used to block requests to local and private networks could be circumvented using IPv4-Mapped IPv6 address notation. This vulnerability is fixed in 11.16.0.
References
| Link | Resource |
|---|---|
| https://github.com/directus/directus/security/advisories/GHSA-wv3h-5fx7-966h | Vendor Advisory |
Configurations
History
20 Apr 2026, 16:47
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/directus/directus/security/advisories/GHSA-wv3h-5fx7-966h - Vendor Advisory | |
| CPE | cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:* | |
| First Time |
Monospace
Monospace directus |
06 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-06 22:16
Updated : 2026-04-20 16:47
NVD link : CVE-2026-35409
Mitre link : CVE-2026-35409
CVE.ORG link : CVE-2026-35409
JSON object : View
Products Affected
monospace
- directus
CWE
CWE-918
Server-Side Request Forgery (SSRF)
