CVE-2026-25574

Payload is a free and open source headless content management system. Prior to 3.74.0, a cross-collection Insecure Direct Object Reference (IDOR) vulnerability exists in the payload-preferences internal collection. In multi-auth collection environments using Postgres or SQLite with default serial/auto-increment IDs, authenticated users from one auth collection can read and delete preferences belonging to users in different auth collections when their numeric IDs collide. This vulnerability has been patched in v3.74.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:payloadcms:payload:*:*:*:*:*:node.js:*:*

History

20 Feb 2026, 20:14

Type Values Removed Values Added
References () https://github.com/payloadcms/payload/security/advisories/GHSA-jq29-r496-r955 - () https://github.com/payloadcms/payload/security/advisories/GHSA-jq29-r496-r955 - Vendor Advisory
First Time Payloadcms
Payloadcms payload
CPE cpe:2.3:a:payloadcms:payload:*:*:*:*:*:node.js:*:*

06 Feb 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-06 22:16

Updated : 2026-02-20 20:14


NVD link : CVE-2026-25574

Mitre link : CVE-2026-25574

CVE.ORG link : CVE-2026-25574


JSON object : View

Products Affected

payloadcms

  • payload
CWE
CWE-639

Authorization Bypass Through User-Controlled Key