Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. directus
  4. ›
  5. CVE-2026-35409

CVE-2026-35409: Directus: SSRF Protection Bypass via IPv4-Mapped IPv6 Addresses in File Import

April 4, 2026 (updated April 7, 2026)

A Server-Side Request Forgery (SSRF) protection bypass has been identified and fixed in Directus. The IP address validation mechanism used to block requests to local and private networks could be circumvented using IPv4-Mapped IPv6 address notation.

References

  • github.com/advisories/GHSA-wv3h-5fx7-966h
  • github.com/directus/directus
  • github.com/directus/directus/security/advisories/GHSA-wv3h-5fx7-966h
  • nvd.nist.gov/vuln/detail/CVE-2026-35409

Code Behaviors & Features

Detect and mitigate CVE-2026-35409 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 11.16.0

Fixed versions

  • 11.16.0

Solution

Upgrade to version 11.16.0 or above.

Impact 7.7 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-20: Improper Input Validation
  • CWE-918: Server-Side Request Forgery (SSRF)

Source file

npm/directus/CVE-2026-35409.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:19:06 +0000.