Neotoma: Unauthenticated Inspector/API access via reverse-proxy loopback auth bypass
Description
Neotoma versions starting at v0.6.0 can treat public reverse-proxied requests as local when the app receives them over a loopback socket and no Bearer token is present.
In affected deployments, the REST auth middleware can resolve unauthenticated requests as the local development user, making the hosted Inspector and related API surface reachable without credentials.
Impact: unauthorized access to production data exposed through the Inspector/API on affected deployments.
Affected condition: a public deployment behind a reverse proxy or same-host tunnel that forwards traffic to the Node process over loopback.
Remediation implemented on the main branch: local-request detection now fails closed in production unless loopback trust is explicitly enabled, and forwarded public clients remain remote.
Patched release version is pending; this draft will be updated once the fix is released.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Neotoma v0.6.0–v0.11.0 trusts loopback socket traffic as local, letting unauthenticated reverse-proxy users access the Inspector and API.
Vulnerability: The Neotoma REST auth middleware in versions v0.6.0 through v0.11.0 treats any request arriving over a loopback socket (127.0.0.1) as local traffic, even when that request was forwarded by a reverse proxy or same-host tunnel. When no Bearer token is present, the middleware resolves the request as the local development user, bypassing authentication entirely. [1][2]
Exploitation: The attack requires the Neotoma instance to be deployed behind a reverse proxy or tunnel that forwards traffic to the Node process over loopback. An unauthenticated attacker sending requests to the public-facing endpoint will have those requests forwarded to the loopback socket and subsequently treated as local. No previously established session or credential is required. The affected condition is specifically a production deployment where traffic arrives via loopback and no token is provided. [2]
Impact: An attacker can reach the hosted Inspector and the associated REST API surface without credentials, gaining unauthorized access to production data exposed through those interfaces. The impact is limited to reading data reachable via the Inspector and API within the privileges of the local user's permissions. [2][3]
Mitigation: The fix is released in neotoma v0.11.1. The hotfix changes local-request detection to fail closed in production; it now checks the X-Forwarded-For header and, if present, requires every forwarded hop to be a loopback address before treating the request as local. Operators who intentionally use same-host trusted auth can re-enable loopback trust with the environment variable NEOTOMA_TRUST_PROD_LOOPBACK=1, but the default now rejects unauthenticated public forwarded traffic. [1][2]
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.