Payload is a free and open source headless content management system. Prior to 3.74.0, a cross-collection Insecure Direct Object Reference (IDOR) vulnerability exists in the payload-preferences internal collection. In multi-auth collection environments using Postgres or SQLite with default serial/auto-increment IDs, authenticated users from one auth collection can read and delete preferences belonging to users in different auth collections when their numeric IDs collide. This vulnerability has been patched in v3.74.0.
References
| Link | Resource |
|---|---|
| https://github.com/payloadcms/payload/security/advisories/GHSA-jq29-r496-r955 | Vendor Advisory |
Configurations
History
20 Feb 2026, 20:14
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/payloadcms/payload/security/advisories/GHSA-jq29-r496-r955 - Vendor Advisory | |
| First Time |
Payloadcms
Payloadcms payload |
|
| CPE | cpe:2.3:a:payloadcms:payload:*:*:*:*:*:node.js:*:* |
06 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-06 22:16
Updated : 2026-02-20 20:14
NVD link : CVE-2026-25574
Mitre link : CVE-2026-25574
CVE.ORG link : CVE-2026-25574
JSON object : View
Products Affected
payloadcms
- payload
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
