Skip to content

Commit febc048

Browse files
1 parent cb078b7 commit febc048

1 file changed

Lines changed: 69 additions & 0 deletions

File tree

Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-hhfx-5x8j-f5f6",
4+
"modified": "2026-02-24T20:10:32Z",
5+
"published": "2026-02-24T20:10:32Z",
6+
"aliases": [
7+
"CVE-2026-27567"
8+
],
9+
"summary": "Payload: Server-Side Request Forgery (SSRF) in External File URL Uploads",
10+
"details": "### Impact\n\nA Server-Side Request Forgery (SSRF) vulnerability exists in Payload's external file upload functionality. When processing external URLs for file uploads, insufficient validation of HTTP redirects could allow an authenticated attacker to access internal network resources.\n\n**Users are affected if ALL of these are true**:\n\n- Payload version < v3.75.0\n- At least one collection with `upload` enabled\n- A user has `create` access to that upload-enabled collection\n\nAn authenticated user with upload collection write permissions could potentially access internal services. Response content from internal services could be retrieved through the application.\n\n### Patches\n\nThis vulnerability has been patched in v3.75.0. Users should upgrade to v3.75.0 or later.\n\n### Workarounds\n\nIf users cannot upgrade immediately, they can mitigate this vulnerability by disabling external file uploads via the `disableExternalFile` upload collection option, or by restricting `create` access on upload-enabled collections to **trusted users only**.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "payload"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "3.75.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/payloadcms/payload/security/advisories/GHSA-hhfx-5x8j-f5f6"
42+
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27567"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/payloadcms/payload/commit/1041bb6"
50+
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/payloadcms/payload"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://github.com/payloadcms/payload/releases/tag/v3.75.0"
58+
}
59+
],
60+
"database_specific": {
61+
"cwe_ids": [
62+
"CWE-918"
63+
],
64+
"severity": "MODERATE",
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2026-02-24T20:10:32Z",
67+
"nvd_published_at": "2026-02-24T15:21:38Z"
68+
}
69+
}

0 commit comments

Comments
 (0)