CVE-2026-35409

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.0, a Server-Side Request Forgery (SSRF) protection bypass has been identified and fixed in Directus. The IP address validation mechanism used to block requests to local and private networks could be circumvented using IPv4-Mapped IPv6 address notation. This vulnerability is fixed in 11.16.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*

History

20 Apr 2026, 16:47

Type Values Removed Values Added
References () https://github.com/directus/directus/security/advisories/GHSA-wv3h-5fx7-966h - () https://github.com/directus/directus/security/advisories/GHSA-wv3h-5fx7-966h - Vendor Advisory
CPE cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*
First Time Monospace
Monospace directus

06 Apr 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-06 22:16

Updated : 2026-04-20 16:47


NVD link : CVE-2026-35409

Mitre link : CVE-2026-35409

CVE.ORG link : CVE-2026-35409


JSON object : View

Products Affected

monospace

  • directus
CWE
CWE-918

Server-Side Request Forgery (SSRF)