Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27567: CWE-918: Server-Side Request Forgery (SSRF) in payloadcms payload

0
Medium
VulnerabilityCVE-2026-27567cvecve-2026-27567cwe-918
Published: Tue Feb 24 2026 (02/24/2026, 14:22:37 UTC)
Source: CVE Database V5
Vendor/Project: payloadcms
Product: payload

Description

Payload is a free and open source headless content management system. Prior to 3.75.0, a Server-Side Request Forgery (SSRF) vulnerability exists in Payload's external file upload functionality. When processing external URLs for file uploads, insufficient validation of HTTP redirects could allow an authenticated attacker to access internal network resources. The Payload environment must have at least one collection with `upload` enabled and a user who has `create` access to that upload-enabled collection in order to be vulnerable. An authenticated user with upload collection write permissions could potentially access internal services. Response content from internal services could be retrieved through the application. This vulnerability has been patched in v3.75.0. As a workaround, one may mitigate this vulnerability by disabling external file uploads via the `disableExternalFile` upload collection option, or by restricting `create` access on upload-enabled collections to trusted users only.

AI-Powered Analysis

AILast updated: 02/24/2026, 15:02:03 UTC

Technical Analysis

Payload CMS is an open-source headless content management system that prior to version 3.75.0 contained a Server-Side Request Forgery (SSRF) vulnerability identified as CVE-2026-27567 (CWE-918). This vulnerability arises from insufficient validation of HTTP redirects when processing external URLs during file uploads. Specifically, if an authenticated user has create permissions on at least one collection with upload enabled, they can exploit this flaw to make the server perform HTTP requests to internal network resources that are otherwise inaccessible externally. The SSRF allows the attacker to retrieve response content from these internal services, potentially exposing sensitive internal data or enabling further attacks. The vulnerability does not require user interaction beyond authentication and appropriate permissions but does require that the Payload environment be configured with upload-enabled collections. The vulnerability was addressed in Payload CMS version 3.75.0. Workarounds include disabling external file uploads via the disableExternalFile option or restricting create access on upload-enabled collections to trusted users only. The CVSS v3.1 base score is 6.5, reflecting network attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, and high impact on confidentiality and integrity but no impact on availability.

Potential Impact

The SSRF vulnerability allows authenticated users with specific permissions to access internal network resources that are normally protected from external access. This can lead to unauthorized disclosure of sensitive internal information, such as internal APIs, metadata services, or other backend systems. The confidentiality and integrity of internal systems may be compromised, potentially enabling further lateral movement or privilege escalation within an organization's network. Although the vulnerability requires authentication and specific permissions, in environments where user access controls are lax or compromised accounts exist, the risk is significant. Organizations using vulnerable versions of Payload CMS with upload-enabled collections are at risk of internal network reconnaissance and data leakage. The impact is primarily on confidentiality and integrity, with no direct availability impact. Since Payload CMS is used worldwide, organizations running vulnerable versions in production environments face potential exposure until patched or mitigated.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade Payload CMS to version 3.75.0 or later, where the SSRF flaw is patched. If immediate upgrading is not feasible, administrators should disable external file uploads by setting the disableExternalFile option on upload-enabled collections to prevent processing of external URLs. Additionally, restrict create permissions on upload-enabled collections strictly to trusted and verified users to reduce the risk of exploitation. Implement network-level controls such as internal service segmentation and firewall rules to limit the Payload server's ability to access sensitive internal endpoints. Monitor logs for unusual upload activity or unexpected internal requests originating from the CMS server. Conduct regular audits of user permissions and review upload collection configurations to ensure adherence to the principle of least privilege. Finally, educate administrators and developers about the risks of SSRF and secure coding practices related to file uploads and URL handling.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T17:40:28.448Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699db9f0be58cf853be5eca1

Added to database: 2/24/2026, 2:47:12 PM

Last enriched: 2/24/2026, 3:02:03 PM

Last updated: 2/24/2026, 11:39:54 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats