Untriaged
Permalink
CVE-2026-25574
5.4 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): NONE
Payload Affected by Cross-Collection IDOR in payload-preferences Access Control (Multi-Auth Environments)
Payload is a free and open source headless content management system. Prior to 3.74.0, a cross-collection Insecure Direct Object Reference (IDOR) vulnerability exists in the payload-preferences internal collection. In multi-auth collection environments using Postgres or SQLite with default serial/auto-increment IDs, authenticated users from one auth collection can read and delete preferences belonging to users in different auth collections when their numeric IDs collide. This vulnerability has been patched in v3.74.0.
References
-
https://github.com/payloadcms/payload/security/advisories/GHSA-jq29-r496-r955 x_refsource_CONFIRM
Affected products
payload
- ==< 3.74.0
Matching in nixpkgs
pkgs.payload_dumper
Android OTA payload dumper
-
nixos-unstable 0-unstable-2022-04-11
- nixpkgs-unstable 0-unstable-2022-04-11
- nixos-unstable-small 0-unstable-2022-04-11
-
nixos-25.11 0-unstable-2022-04-11
- nixpkgs-25.11-darwin 0-unstable-2022-04-11
pkgs.payload-dumper-go
Android OTA payload dumper written in Go
Package maintainers
-
@Aleksanaa Aleksana QwQ <me@aleksana.moe>
-
@DamienCassou Damien Cassou <damien@cassou.me>
-
@shard77 Léon Gessner <sh7user@gmail.com>
-
@felbinger Nico Felbinger <nico@felbinger.eu>