CVE-2026-25574: CWE-639: Authorization Bypass Through User-Controlled Key in payloadcms payload
Payload is a free and open source headless content management system. Prior to 3.74.0, a cross-collection Insecure Direct Object Reference (IDOR) vulnerability exists in the payload-preferences internal collection. In multi-auth collection environments using Postgres or SQLite with default serial/auto-increment IDs, authenticated users from one auth collection can read and delete preferences belonging to users in different auth collections when their numeric IDs collide. This vulnerability has been patched in v3.74.0.
AI Analysis
Technical Summary
CVE-2026-25574 is a medium severity authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting Payload CMS, a free and open-source headless content management system. The flaw exists in versions prior to 3.74.0 within the payload-preferences internal collection. In environments where multiple authentication collections are used alongside Postgres or SQLite databases configured with default serial or auto-increment numeric IDs, a collision in these numeric IDs across different auth collections can occur. This collision enables an authenticated user from one authentication collection to read and delete preference records belonging to users in other authentication collections, effectively bypassing authorization boundaries. The vulnerability is an Insecure Direct Object Reference (IDOR) because the system relies on numeric IDs that are user-controllable and not sufficiently segregated across collections. Exploitation requires the attacker to be authenticated but does not require additional user interaction, and the attack vector is network-based. The vulnerability impacts confidentiality by exposing user preferences across collections and integrity by allowing deletion of those preferences. Availability is not impacted. The vulnerability has been addressed and patched in Payload CMS version 3.74.0 by presumably improving authorization checks and/or segregating ID spaces across auth collections. No known exploits are reported in the wild as of the publication date. The CVSS v3.1 score is 5.4, reflecting medium severity due to the requirement for authentication and limited impact scope.
Potential Impact
For European organizations using Payload CMS in multi-auth collection configurations with Postgres or SQLite databases, this vulnerability poses a risk of unauthorized access and deletion of user preference data across authentication boundaries. This could lead to privacy breaches, loss of user-specific configurations, and potential disruption of user experience or administrative processes relying on these preferences. While the vulnerability does not affect system availability, the confidentiality and integrity impacts could undermine trust in affected services, especially in sectors handling sensitive or regulated data such as finance, healthcare, and public administration. Organizations with complex multi-tenant or multi-auth setups are particularly at risk. The breach of user preferences might also facilitate further targeted attacks or social engineering if attackers gain insight into user settings or behaviors. Compliance with GDPR and other data protection regulations could be jeopardized if unauthorized data access occurs, potentially resulting in legal and reputational consequences.
Mitigation Recommendations
European organizations should immediately upgrade Payload CMS installations to version 3.74.0 or later to remediate this vulnerability. For environments where immediate patching is not feasible, administrators should review and restrict access controls on the payload-preferences collection, ensuring strict segregation between authentication collections. Implementing additional application-layer authorization checks to verify ownership of preference records before read or delete operations can reduce risk. Database administrators should consider customizing ID generation strategies to avoid numeric ID collisions across auth collections, such as using UUIDs or composite keys incorporating collection identifiers. Monitoring and logging access to the preferences collection can help detect suspicious activity indicative of exploitation attempts. Organizations should also conduct audits of user preference data integrity and access patterns post-patch to identify any unauthorized access or deletions. Finally, educating developers and administrators about the risks of IDOR vulnerabilities and secure multi-auth collection design is recommended to prevent similar issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2026-25574: CWE-639: Authorization Bypass Through User-Controlled Key in payloadcms payload
Description
Payload is a free and open source headless content management system. Prior to 3.74.0, a cross-collection Insecure Direct Object Reference (IDOR) vulnerability exists in the payload-preferences internal collection. In multi-auth collection environments using Postgres or SQLite with default serial/auto-increment IDs, authenticated users from one auth collection can read and delete preferences belonging to users in different auth collections when their numeric IDs collide. This vulnerability has been patched in v3.74.0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-25574 is a medium severity authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting Payload CMS, a free and open-source headless content management system. The flaw exists in versions prior to 3.74.0 within the payload-preferences internal collection. In environments where multiple authentication collections are used alongside Postgres or SQLite databases configured with default serial or auto-increment numeric IDs, a collision in these numeric IDs across different auth collections can occur. This collision enables an authenticated user from one authentication collection to read and delete preference records belonging to users in other authentication collections, effectively bypassing authorization boundaries. The vulnerability is an Insecure Direct Object Reference (IDOR) because the system relies on numeric IDs that are user-controllable and not sufficiently segregated across collections. Exploitation requires the attacker to be authenticated but does not require additional user interaction, and the attack vector is network-based. The vulnerability impacts confidentiality by exposing user preferences across collections and integrity by allowing deletion of those preferences. Availability is not impacted. The vulnerability has been addressed and patched in Payload CMS version 3.74.0 by presumably improving authorization checks and/or segregating ID spaces across auth collections. No known exploits are reported in the wild as of the publication date. The CVSS v3.1 score is 5.4, reflecting medium severity due to the requirement for authentication and limited impact scope.
Potential Impact
For European organizations using Payload CMS in multi-auth collection configurations with Postgres or SQLite databases, this vulnerability poses a risk of unauthorized access and deletion of user preference data across authentication boundaries. This could lead to privacy breaches, loss of user-specific configurations, and potential disruption of user experience or administrative processes relying on these preferences. While the vulnerability does not affect system availability, the confidentiality and integrity impacts could undermine trust in affected services, especially in sectors handling sensitive or regulated data such as finance, healthcare, and public administration. Organizations with complex multi-tenant or multi-auth setups are particularly at risk. The breach of user preferences might also facilitate further targeted attacks or social engineering if attackers gain insight into user settings or behaviors. Compliance with GDPR and other data protection regulations could be jeopardized if unauthorized data access occurs, potentially resulting in legal and reputational consequences.
Mitigation Recommendations
European organizations should immediately upgrade Payload CMS installations to version 3.74.0 or later to remediate this vulnerability. For environments where immediate patching is not feasible, administrators should review and restrict access controls on the payload-preferences collection, ensuring strict segregation between authentication collections. Implementing additional application-layer authorization checks to verify ownership of preference records before read or delete operations can reduce risk. Database administrators should consider customizing ID generation strategies to avoid numeric ID collisions across auth collections, such as using UUIDs or composite keys incorporating collection identifiers. Monitoring and logging access to the preferences collection can help detect suspicious activity indicative of exploitation attempts. Organizations should also conduct audits of user preference data integrity and access patterns post-patch to identify any unauthorized access or deletions. Finally, educating developers and administrators about the risks of IDOR vulnerabilities and secure multi-auth collection design is recommended to prevent similar issues.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-03T01:02:46.714Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69865d61f9fa50a62f35a6b7
Added to database: 2/6/2026, 9:30:09 PM
Last enriched: 2/14/2026, 12:09:58 PM
Last updated: 3/24/2026, 2:10:58 AM
Views: 85
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.