We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-30350

Directus's S3 assets become unavailable after a burst of HEAD requests



Description

Directus is a real-time API and App dashboard for managing SQL database content. The `@directus/storage-driver-s3` package starting in version 9.22.0 and prior to version 12.0.1, corresponding to Directus starting in version 9.22.0 and prior to 11.5.0, is vulnerable to asset unavailability after a burst of HEAD requests. Some tools use Directus to sync content and assets, and some of those tools use the HEAD method to check the existence of files. When making many HEAD requests at once, at some point, all assets are eventually served as 403. This causes denial of assets for all policies of Directus, including Admin and Public. Version 12.0.1 of the `@directus/storage-driver-s3` package, corresponding to version 11.5.0 of Directus, fixes the issue.

Reserved 2025-03-21 | Published 2025-03-26 | Updated 2025-03-26 | Assigner GitHub_M


MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Problem types

CWE-770: Allocation of Resources Without Limits or Throttling

Product status

>= 9.22.0, < 11.5.0
affected

References

github.com/...rectus/security/advisories/GHSA-rv78-qqrq-73m5

cve.org (CVE-2025-30350)

nvd.nist.gov (CVE-2025-30350)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-30350

Support options

Helpdesk Chat, Email, Knowledgebase