Directus is a real-time API and App dashboard for managing SQL database content. When relying on blocking access to localhost using the default `0.0.0.0` filter a user may bypass this block by using other registered loopback devices (like `127.0.0.2` - `127.127.127.127`). This issue has been addressed in release versions 10.13.3 and 11.1.0. Users are advised to upgrade. Users unable to upgrade may block this bypass by manually adding the `127.0.0.0/8` CIDR range which will block access to any `127.X.X.X` ip instead of just `127.0.0.1`.
References
Configurations
Configuration 1 (hide)
|
History
17 Nov 2025, 18:49
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-918 | |
| CPE | cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:* | |
| First Time |
Monospace
Monospace directus |
|
| References | () https://github.com/directus/directus/commit/4aace0bbe57232e38cd6a287ee475293e46dc91b - Patch | |
| References | () https://github.com/directus/directus/commit/769fa22797bff5a9231599883b391e013f122e52 - Patch | |
| References | () https://github.com/directus/directus/commit/8cbf943b65fd4a763d09a5fdbba8996b1e7797ff - Patch | |
| References | () https://github.com/directus/directus/commit/c1f3ccc681595038d094ce110ddeee38cb38f431 - Patch | |
| References | () https://github.com/directus/directus/security/advisories/GHSA-68g8-c275-xf2m - Vendor Advisory, Mitigation |
Information
Published : 2024-09-18 17:15
Updated : 2025-11-17 18:49
NVD link : CVE-2024-46990
Mitre link : CVE-2024-46990
CVE.ORG link : CVE-2024-46990
JSON object : View
Products Affected
monospace
- directus
