Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. payload
  4. ›
  5. CVE-2026-27567

CVE-2026-27567: Payload: Server-Side Request Forgery (SSRF) in External File URL Uploads

February 24, 2026

A Server-Side Request Forgery (SSRF) vulnerability exists in Payload’s external file upload functionality. When processing external URLs for file uploads, insufficient validation of HTTP redirects could allow an authenticated attacker to access internal network resources.

Users are affected if ALL of these are true:

  • Payload version < v3.75.0
  • At least one collection with upload enabled
  • A user has create access to that upload-enabled collection

An authenticated user with upload collection write permissions could potentially access internal services. Response content from internal services could be retrieved through the application.

References

  • github.com/advisories/GHSA-hhfx-5x8j-f5f6
  • github.com/payloadcms/payload
  • github.com/payloadcms/payload/commit/1041bb6
  • github.com/payloadcms/payload/releases/tag/v3.75.0
  • github.com/payloadcms/payload/security/advisories/GHSA-hhfx-5x8j-f5f6
  • nvd.nist.gov/vuln/detail/CVE-2026-27567

Code Behaviors & Features

Detect and mitigate CVE-2026-27567 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.75.0

Fixed versions

  • 3.75.0

Solution

Upgrade to version 3.75.0 or above.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-918: Server-Side Request Forgery (SSRF)

Source file

npm/payload/CVE-2026-27567.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 25 Feb 2026 12:18:54 +0000.