top of page
perceptive_background_267k.jpg

Payload is a free and open source headless content management system. Prior to version 3.79.1, an authenticated Server-Side Request Forgery (SSRF) vulnerability…

Published:

31 maart 2026 om 22:00:00

Alert date:

1 april 2026 om 21:03:40

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies

A Server-Side Request Forgery (SSRF) vulnerability was discovered in Payload CMS, a free and open source headless content management system. The vulnerability affects versions prior to 3.79.1 and exists in the upload functionality. Authenticated users with create or update access to upload-enabled collections can exploit this vulnerability to cause the server to make outbound HTTP requests to arbitrary URLs. This could potentially allow attackers to access internal resources, perform port scanning, or interact with services that should not be accessible. The vulnerability requires authentication but can be exploited by users with relatively low privileges. The issue has been addressed and patched in version 3.79.1.

Technical details

Mitigation steps:

Affected products:

Payload CMS

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page