GHSA-5cvp-p7p4-mcx9Medium
Neotoma: Unauthenticated Inspector/API access via reverse-proxy loopback auth bypass
🔗 CVE IDs covered (1)
📋 Description
Neotoma versions starting at v0.6.0 can treat public reverse-proxied requests as local when the app receives them over a loopback socket and no Bearer token is present.
In affected deployments, the REST auth middleware can resolve unauthenticated requests as the local development user, making the hosted Inspector and related API surface reachable without credentials.
Impact: unauthorized access to production data exposed through the Inspector/API on affected deployments.
Affected condition: a public deployment behind a reverse proxy or same-host tunnel that forwards traffic to the Node process over loopback.
Remediation implemented on the main branch: local-request detection now fails closed in production unless loopback trust is explicitly enabled, and forwarded public clients remain remote.
Patched release version is pending; this draft will be updated once the fix is released.
🎯 Affected products1
- npm/neotoma:>= 0.6.0, < 0.11.1