Moderate severityNVD Advisory· Published Feb 6, 2026· Updated Feb 9, 2026
Payload Affected by Cross-Collection IDOR in payload-preferences Access Control (Multi-Auth Environments)
CVE-2026-25574
Description
Payload is a free and open source headless content management system. Prior to 3.74.0, a cross-collection Insecure Direct Object Reference (IDOR) vulnerability exists in the payload-preferences internal collection. In multi-auth collection environments using Postgres or SQLite with default serial/auto-increment IDs, authenticated users from one auth collection can read and delete preferences belonging to users in different auth collections when their numeric IDs collide. This vulnerability has been patched in v3.74.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
payloadnpm | < 3.74.0 | 3.74.0 |
Affected products
1- Range: < 3.74.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-jq29-r496-r955ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-25574ghsaADVISORY
- github.com/payloadcms/payload/security/advisories/GHSA-jq29-r496-r955ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.