CVE-2026-27567
中文标题:
(暂无数据)
英文标题:
Payload has Server-Side Request Forgery (SSRF) in External File URL Uploads
漏洞描述
中文描述:
(暂无数据)
英文描述:
Payload is a free and open source headless content management system. Prior to 3.75.0, a Server-Side Request Forgery (SSRF) vulnerability exists in Payload's external file upload functionality. When processing external URLs for file uploads, insufficient validation of HTTP redirects could allow an authenticated attacker to access internal network resources. The Payload environment must have at least one collection with `upload` enabled and a user who has `create` access to that upload-enabled collection in order to be vulnerable. An authenticated user with upload collection write permissions could potentially access internal services. Response content from internal services could be retrieved through the application. This vulnerability has been patched in v3.75.0. As a workaround, one may mitigate this vulnerability by disabling external file uploads via the `disableExternalFile` upload collection option, or by restricting `create` access on upload-enabled collections to trusted users only.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| payloadcms | payload | < 3.75.0 | - | - |
cpe:2.3:a:payloadcms:payload:<_3.75.0:*:*:*:*:*:*:*
|
| payloadcms | payload | * | - | - |
cpe:2.3:a:payloadcms:payload:*:*:*:*:*:node.js:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
3.1 (cna)
MEDIUMCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2026-27567 |
2026-02-25 03:19:54 | 2026-02-24 22:00:01 |
| NVD | nvd_CVE-2026-27567 |
2026-02-25 02:00:04 | 2026-02-24 22:00:04 |
版本与语言
安全公告
变更历史
查看详细变更
- affected_products_count: 1 -> 2
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']