Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @delmaredigital/payload-puck
  4. ›
  5. CVE-2026-39397

CVE-2026-39397: @delmaredigital/payload-puc is missing authorization on /api/puck/* CRUD endpoints allows unauthenticated access to Puck-registered collections

April 8, 2026

All /api/puck/* CRUD endpoint handlers registered by createPuckPlugin() called Payload’s local API with the default overrideAccess: true, bypassing all collection-level access control. The access option passed to createPuckPlugin() and any access rules defined on Puck-registered collections were silently ignored on these endpoints.

An unauthenticated remote attacker could:

  • List all documents (including drafts) in any Puck-registered collection
  • Read any document by ID (including drafts)
  • Create new documents with arbitrary field values
  • Update any document (including bypassing field-level access rules)
  • Delete any document
  • Read version history and restore arbitrary versions

In typical installations, the affected scope is the collection backing the website’s pages (default slug: pages). For most users this means an attacker could read, modify, create, or delete every page on the website — including unpublished drafts and version history.

Scope is limited to collections explicitly registered with createPuckPlugin() — the endpoints validate the collection slug against an allowlist, so attackers cannot pivot to other Payload collections such as users, media, or business data not exposed to the plugin. The auto-created puck-templates, puck-ai-prompts, and puck-ai-context collections are also outside the allowlist; they have their own dedicated endpoints with separate authentication.

Other endpoints in the plugin (AI, styles, prompts, context, and the Next.js API route factories in src/api/) were unaffected — they had their own authentication checks.

References

  • github.com/advisories/GHSA-65w6-pf7x-5g85
  • github.com/delmaredigital/payload-puck
  • github.com/delmaredigital/payload-puck/commit/9148201c6bbfa140d44546438027a2f8a70f79a4
  • github.com/delmaredigital/payload-puck/issues/7
  • github.com/delmaredigital/payload-puck/security/advisories/GHSA-65w6-pf7x-5g85
  • nvd.nist.gov/vuln/detail/CVE-2026-39397

Code Behaviors & Features

Detect and mitigate CVE-2026-39397 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.6.23

Fixed versions

  • 0.6.23

Solution

Upgrade to version 0.6.23 or above.

Impact 9.4 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

Learn more about CVSS

Weakness

  • CWE-862: Missing Authorization

Source file

npm/@delmaredigital/payload-puck/CVE-2026-39397.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:38 +0000.