GHSA-68g8-c275-xf2m
GitHub Security Advisory
Directus vulnerable to SSRF Loopback IP filter bypass
✓ GitHub Reviewed
MODERATE
Has CVE
Advisory Details
### Impact
If you're relying on blocking access to localhost using the default `0.0.0.0` filter this can be bypassed using other registered loopback devices (like `127.0.0.2` - `127.127.127.127`)
### Workaround
You can block this bypass by manually adding the `127.0.0.0/8` CIDR range which will block access to any `127.X.X.X` ip instead of just `127.0.0.1`.
Affected Packages
npm
directus
Affected versions:
0
(fixed in 10.13.3)
npm
directus
Affected versions:
11.0.0
(fixed in 11.1.0)
npm
@directus/api
Affected versions:
0
(fixed in 21.0.0)
npm
@directus/api
Affected versions:
22.0.0
(fixed in 22.1.1)
Related CVEs
Key Information
5.0
/10
Dataset
Last updated: September 12, 2025 6:34 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.