


Perceptive Security
SOC/SIEM Consultancy

Payload is a free and open source headless content management system. Prior to version 3.79.1, an authenticated Server-Side Request Forgery (SSRF) vulnerability…
Published:
31 maart 2026 om 22:00:00
Alert date:
1 april 2026 om 21:03:40
Source:
nvd.nist.gov
Web Technologies
A Server-Side Request Forgery (SSRF) vulnerability was discovered in Payload CMS, a free and open source headless content management system. The vulnerability affects versions prior to 3.79.1 and exists in the upload functionality. Authenticated users with create or update access to upload-enabled collections can exploit this vulnerability to cause the server to make outbound HTTP requests to arbitrary URLs. This could potentially allow attackers to access internal resources, perform port scanning, or interact with services that should not be accessible. The vulnerability requires authentication but can be exploited by users with relatively low privileges. The issue has been addressed and patched in version 3.79.1.
Technical details
Mitigation steps:
Affected products:
Payload CMS
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-34746
https://github.com/payloadcms/payload/releases/tag/v3.79.1
https://github.com/payloadcms/payload/security/advisories/GHSA-6r7f-q7f5-wpx8
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
