Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27567: CWE-918: Server-Side Request Forgery (SSRF) in payloadcms payload

0
Medium
VulnerabilityCVE-2026-27567cvecve-2026-27567cwe-918
Published: Tue Feb 24 2026 (02/24/2026, 14:22:37 UTC)
Source: CVE Database V5
Vendor/Project: payloadcms
Product: payload

Description

Payload is a free and open source headless content management system. Prior to 3.75.0, a Server-Side Request Forgery (SSRF) vulnerability exists in Payload's external file upload functionality. When processing external URLs for file uploads, insufficient validation of HTTP redirects could allow an authenticated attacker to access internal network resources. The Payload environment must have at least one collection with `upload` enabled and a user who has `create` access to that upload-enabled collection in order to be vulnerable. An authenticated user with upload collection write permissions could potentially access internal services. Response content from internal services could be retrieved through the application. This vulnerability has been patched in v3.75.0. As a workaround, one may mitigate this vulnerability by disabling external file uploads via the `disableExternalFile` upload collection option, or by restricting `create` access on upload-enabled collections to trusted users only.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 18:53:33 UTC

Technical Analysis

Payload CMS is an open-source headless content management system that prior to version 3.75.0 contained a Server-Side Request Forgery (SSRF) vulnerability identified as CVE-2026-27567 (CWE-918). This vulnerability exists in the external file upload functionality, where the system insufficiently validates HTTP redirects when processing URLs for file uploads. Specifically, if an authenticated user has create permissions on at least one collection with upload enabled, they can supply crafted URLs that cause the server to make HTTP requests to internal network resources. Because the server follows redirects without proper validation, an attacker can leverage this to access internal services that are otherwise inaccessible externally. The attacker can then retrieve and view response content from these internal services via the Payload CMS interface, potentially exposing sensitive internal information or services. Exploitation requires authentication and specific permissions, limiting the attack surface to authorized users with upload create rights. The vulnerability does not affect availability but impacts confidentiality and integrity by exposing internal data and potentially allowing further attacks. The issue was addressed in Payload CMS version 3.75.0 by improving validation and handling of external URLs in file uploads. As a temporary mitigation, administrators can disable external file uploads using the `disableExternalFile` option or restrict create access on upload-enabled collections to trusted users only. The CVSS v3.1 score of 6.5 reflects a medium severity, with network attack vector, low attack complexity, high privileges required, no user interaction, and high confidentiality and integrity impact. No public exploits have been reported so far.

Potential Impact

The primary impact of this SSRF vulnerability is unauthorized access to internal network resources through the Payload CMS server, which acts as a proxy for HTTP requests. This can lead to exposure of sensitive internal services, data leakage, and potential reconnaissance for further attacks within an organization's internal network. Confidentiality is significantly affected as attackers can retrieve response content from internal endpoints. Integrity could also be impacted if internal services are manipulated or exploited further after discovery. Availability is not directly affected by this vulnerability. Since exploitation requires authenticated users with specific permissions, the risk is higher in environments with multiple users or where user access controls are lax. Organizations using vulnerable versions of Payload CMS with upload-enabled collections and multiple users with create permissions are at risk. This could affect internal services that are not otherwise exposed to the internet, increasing the attack surface. The vulnerability could be leveraged by malicious insiders or compromised accounts to pivot into internal networks. Although no known exploits are reported in the wild, the medium CVSS score and the nature of SSRF vulnerabilities suggest that attackers could weaponize this flaw if discovered. The impact is particularly critical for organizations relying on Payload CMS for content management in sensitive environments, such as enterprises, government agencies, and service providers.

Mitigation Recommendations

1. Upgrade Payload CMS to version 3.75.0 or later immediately to apply the official patch that fixes the SSRF vulnerability. 2. If upgrading is not immediately possible, disable external file uploads by setting the `disableExternalFile` option in upload-enabled collections to prevent processing of external URLs. 3. Restrict 'create' permissions on upload-enabled collections strictly to trusted and verified users to minimize the risk of exploitation by unauthorized or compromised accounts. 4. Implement network segmentation and firewall rules to limit the Payload CMS server's ability to access sensitive internal services, reducing the impact of potential SSRF exploitation. 5. Monitor logs for unusual or unexpected outbound HTTP requests originating from the Payload CMS server, which could indicate attempted exploitation. 6. Conduct regular access reviews and enforce the principle of least privilege for users with upload permissions. 7. Employ web application firewalls (WAFs) with rules to detect and block SSRF patterns targeting the Payload CMS endpoints. 8. Educate administrators and developers about the risks of SSRF and the importance of validating and sanitizing user-supplied URLs in file upload features. These targeted mitigations go beyond generic advice by focusing on configuration options, access control, network restrictions, and monitoring specific to Payload CMS environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T17:40:28.448Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699db9f0be58cf853be5eca1

Added to database: 2/24/2026, 2:47:12 PM

Last enriched: 3/3/2026, 6:53:33 PM

Last updated: 4/11/2026, 2:15:18 AM

Views: 237

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses