CVE-2025-30350Allocation of Resources Without Limits or Throttling in Directus

Severity
5.3MEDIUMNVD
EPSS
0.2%
top 58.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 26

Description

Directus is a real-time API and App dashboard for managing SQL database content. The `@directus/storage-driver-s3` package starting in version 9.22.0 and prior to version 12.0.1, corresponding to Directus starting in version 9.22.0 and prior to 11.5.0, is vulnerable to asset unavailability after a burst of HEAD requests. Some tools use Directus to sync content and assets, and some of those tools use the HEAD method to check the existence of files. When making many HEAD requests at once, at some

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LExploitability: 3.9 | Impact: 1.4

Affected Packages4 packages

npmdirectus/storage-driver-s39.22.012.0.1
npmdirectus/directus9.2211.5.0
NVDmonospace/directus9.22.011.5.0
CVEListV5directus/directus>= 9.22.0, < 11.5.0

🔴Vulnerability Details

2
OSV
Directus's S3 assets become unavailable after a burst of HEAD requests2025-03-26
GHSA
Directus's S3 assets become unavailable after a burst of HEAD requests2025-03-26