Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25574: CWE-639: Authorization Bypass Through User-Controlled Key in payloadcms payload

0
Medium
VulnerabilityCVE-2026-25574cvecve-2026-25574cwe-639
Published: Fri Feb 06 2026 (02/06/2026, 21:04:48 UTC)
Source: CVE Database V5
Vendor/Project: payloadcms
Product: payload

Description

Payload is a free and open source headless content management system. Prior to 3.74.0, a cross-collection Insecure Direct Object Reference (IDOR) vulnerability exists in the payload-preferences internal collection. In multi-auth collection environments using Postgres or SQLite with default serial/auto-increment IDs, authenticated users from one auth collection can read and delete preferences belonging to users in different auth collections when their numeric IDs collide. This vulnerability has been patched in v3.74.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 12:09:58 UTC

Technical Analysis

CVE-2026-25574 is a medium severity authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting Payload CMS, a free and open-source headless content management system. The flaw exists in versions prior to 3.74.0 within the payload-preferences internal collection. In environments where multiple authentication collections are used alongside Postgres or SQLite databases configured with default serial or auto-increment numeric IDs, a collision in these numeric IDs across different auth collections can occur. This collision enables an authenticated user from one authentication collection to read and delete preference records belonging to users in other authentication collections, effectively bypassing authorization boundaries. The vulnerability is an Insecure Direct Object Reference (IDOR) because the system relies on numeric IDs that are user-controllable and not sufficiently segregated across collections. Exploitation requires the attacker to be authenticated but does not require additional user interaction, and the attack vector is network-based. The vulnerability impacts confidentiality by exposing user preferences across collections and integrity by allowing deletion of those preferences. Availability is not impacted. The vulnerability has been addressed and patched in Payload CMS version 3.74.0 by presumably improving authorization checks and/or segregating ID spaces across auth collections. No known exploits are reported in the wild as of the publication date. The CVSS v3.1 score is 5.4, reflecting medium severity due to the requirement for authentication and limited impact scope.

Potential Impact

For European organizations using Payload CMS in multi-auth collection configurations with Postgres or SQLite databases, this vulnerability poses a risk of unauthorized access and deletion of user preference data across authentication boundaries. This could lead to privacy breaches, loss of user-specific configurations, and potential disruption of user experience or administrative processes relying on these preferences. While the vulnerability does not affect system availability, the confidentiality and integrity impacts could undermine trust in affected services, especially in sectors handling sensitive or regulated data such as finance, healthcare, and public administration. Organizations with complex multi-tenant or multi-auth setups are particularly at risk. The breach of user preferences might also facilitate further targeted attacks or social engineering if attackers gain insight into user settings or behaviors. Compliance with GDPR and other data protection regulations could be jeopardized if unauthorized data access occurs, potentially resulting in legal and reputational consequences.

Mitigation Recommendations

European organizations should immediately upgrade Payload CMS installations to version 3.74.0 or later to remediate this vulnerability. For environments where immediate patching is not feasible, administrators should review and restrict access controls on the payload-preferences collection, ensuring strict segregation between authentication collections. Implementing additional application-layer authorization checks to verify ownership of preference records before read or delete operations can reduce risk. Database administrators should consider customizing ID generation strategies to avoid numeric ID collisions across auth collections, such as using UUIDs or composite keys incorporating collection identifiers. Monitoring and logging access to the preferences collection can help detect suspicious activity indicative of exploitation attempts. Organizations should also conduct audits of user preference data integrity and access patterns post-patch to identify any unauthorized access or deletions. Finally, educating developers and administrators about the risks of IDOR vulnerabilities and secure multi-auth collection design is recommended to prevent similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-03T01:02:46.714Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69865d61f9fa50a62f35a6b7

Added to database: 2/6/2026, 9:30:09 PM

Last enriched: 2/14/2026, 12:09:58 PM

Last updated: 3/24/2026, 2:10:58 AM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses