Home

Description

Payload is a free and open source headless content management system. Prior to 3.74.0, a cross-collection Insecure Direct Object Reference (IDOR) vulnerability exists in the payload-preferences internal collection. In multi-auth collection environments using Postgres or SQLite with default serial/auto-increment IDs, authenticated users from one auth collection can read and delete preferences belonging to users in different auth collections when their numeric IDs collide. This vulnerability has been patched in v3.74.0.

PUBLISHED Reserved 2026-02-03 | Published 2026-02-06 | Updated 2026-02-09 | Assigner GitHub_M




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Problem types

CWE-639: Authorization Bypass Through User-Controlled Key

Product status

< 3.74.0
affected

References

github.com/...ayload/security/advisories/GHSA-jq29-r496-r955

cve.org (CVE-2026-25574)

nvd.nist.gov (CVE-2026-25574)

Download JSON