Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25574: CWE-639: Authorization Bypass Through User-Controlled Key in payloadcms payload

0
Medium
VulnerabilityCVE-2026-25574cvecve-2026-25574cwe-639
Published: Fri Feb 06 2026 (02/06/2026, 21:04:48 UTC)
Source: CVE Database V5
Vendor/Project: payloadcms
Product: payload

Description

CVE-2026-25574 is a medium severity authorization bypass vulnerability affecting Payload CMS versions prior to 3. 74. 0. It arises from an Insecure Direct Object Reference (IDOR) in the internal payload-preferences collection, allowing authenticated users in one authentication collection to read and delete preferences of users in other authentication collections when numeric IDs collide. This issue occurs in multi-auth collection environments using Postgres or SQLite with default auto-increment IDs. Exploitation requires authentication but no user interaction and can lead to unauthorized disclosure and modification of user preferences. The vulnerability has been patched in version 3. 74. 0. European organizations using Payload CMS in multi-auth setups should prioritize updating to mitigate risk.

AI-Powered Analysis

AILast updated: 02/06/2026, 21:45:01 UTC

Technical Analysis

CVE-2026-25574 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting Payload CMS, a free and open-source headless content management system. The vulnerability exists in versions prior to 3.74.0 within the payload-preferences internal collection, specifically in environments configured with multiple authentication collections using Postgres or SQLite databases with default serial or auto-increment numeric IDs. Due to ID collisions across different authentication collections, an authenticated user from one collection can access and delete preference records belonging to users in other collections. This is an instance of an Insecure Direct Object Reference (IDOR) where the system fails to properly enforce authorization checks across collections. The vulnerability does not require user interaction but does require the attacker to be authenticated. Exploitation can lead to unauthorized reading and deletion of user preference data, impacting confidentiality and integrity but not availability. The issue has been addressed and patched in Payload CMS version 3.74.0. No known exploits are reported in the wild as of the publication date. The CVSS v3.1 base score is 5.4, indicating a medium severity level with network attack vector, low attack complexity, requiring privileges but no user interaction, and limited impact on confidentiality and integrity.

Potential Impact

For European organizations using Payload CMS in multi-authentication collection configurations with Postgres or SQLite databases, this vulnerability could allow an authenticated user to access and delete preference data of other users across authentication boundaries. This could lead to unauthorized disclosure of sensitive user settings or preferences and potential disruption of user experience or application behavior due to deleted preferences. While the impact on availability is negligible, the breach of confidentiality and integrity could undermine trust in the system and potentially expose sensitive configuration or personalization data. Organizations in sectors with strict data protection regulations, such as GDPR, could face compliance risks if unauthorized access to user data occurs. The vulnerability's exploitation requires authentication, limiting exposure to internal or compromised users, but insider threats or compromised accounts could leverage this flaw. Since Payload CMS is used in content management, the integrity of user preferences may affect content delivery or administrative functions, potentially impacting business operations or user satisfaction.

Mitigation Recommendations

The primary mitigation is to upgrade Payload CMS to version 3.74.0 or later, where this vulnerability has been patched. Organizations should audit their Payload CMS deployments to identify multi-auth collection configurations using Postgres or SQLite with default auto-increment IDs. As an interim measure before patching, restrict access to authenticated users and enforce strict access controls and monitoring on user preference data. Implement logging and alerting for unusual access or deletion patterns in the payload-preferences collection. Review and harden authentication and authorization mechanisms to prevent privilege escalation or unauthorized access across collections. Consider database-level access controls or row-level security policies to isolate data between authentication collections. Conduct regular security assessments and penetration testing focused on authorization controls within the CMS environment. Finally, educate administrators and developers about the risks of IDOR vulnerabilities and the importance of proper authorization validation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-03T01:02:46.714Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69865d61f9fa50a62f35a6b7

Added to database: 2/6/2026, 9:30:09 PM

Last enriched: 2/6/2026, 9:45:01 PM

Last updated: 2/6/2026, 10:32:29 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats