{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T14:56:20.448","vulnerabilities":[{"cve":{"id":"CVE-2025-30350","sourceIdentifier":"security-advisories@github.com","published":"2025-03-26T17:15:27.093","lastModified":"2025-11-18T17:44:38.713","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Directus is a real-time API and App dashboard for managing SQL database content. The `@directus/storage-driver-s3` package starting in version 9.22.0 and prior to version 12.0.1, corresponding to Directus starting in version 9.22.0 and prior to 11.5.0, is vulnerable to asset unavailability after a burst of HEAD requests. Some tools use Directus to sync content and assets, and some of those tools use the HEAD method to check the existence of files. When making many HEAD requests at once, at some point, all assets are eventually served as 403. This causes denial of assets for all policies of Directus, including Admin and Public. Version 12.0.1 of the `@directus/storage-driver-s3` package, corresponding to version 11.5.0 of Directus, fixes the issue."},{"lang":"es","value":"Directus es una API en tiempo real y un panel de control de aplicaciones para gestionar el contenido de bases de datos SQL. El paquete `@directus/storage-driver-s3`, disponible a partir de la versión 9.22.0 y anteriores a la 12.0.1, correspondiente a Directus a partir de la versión 9.22.0 y anteriores a la 11.5.0, es vulnerable a la indisponibilidad de recursos tras una ráfaga de solicitudes HEAD. Algunas herramientas utilizan Directus para sincronizar contenido y recursos, y otras utilizan el método HEAD para comprobar la existencia de archivos. Al realizar muchas solicitudes HEAD a la vez, en algún momento, todos los recursos se envían como 403. Esto provoca la denegación de recursos para todas las políticas de Directus, incluidas las de administrador y públicas. La versión 12.0.1 del paquete `@directus/storage-driver-s3`, correspondiente a la versión 11.5.0 de Directus, soluciona el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-770"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*","versionStartIncluding":"9.22.0","versionEndExcluding":"11.5.0","matchCriteriaId":"C7A4CEFC-E369-4300-A8D2-8996446C65C5"}]}]}],"references":[{"url":"https://github.com/directus/directus/security/advisories/GHSA-rv78-qqrq-73m5","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}