Description
Payload is a free and open source headless content management system. Prior to version 3.78.0 in @payloadcms/storage-azure, @payloadcms/storage-gcs, @payloadcms/storage-r2, and @payloadcms/storage-s3, the client-upload signed-URL endpoints for S3, GCS, Azure, and R2 did not properly sanitize filenames. An attacker could craft filenames to escape the intended storage location. This issue has been patched in version 3.78.0 for @payloadcms/storage-azure, @payloadcms/storage-gcs, @payloadcms/storage-r2, and @payloadcms/storage-s3.
Published: 2026-04-01
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorised file upload outside intended storage location potentially compromising data integrity and confidentiality
Action: Patch Immediately
AI Analysis

Impact

A path‑traversal issue in the signed‑URL upload endpoints of the Payload content management system allows a remote attacker to craft file names that escape the designated storage bucket. By injecting characters such as '..\' or '/..', the attacker can cause the system to create or overwrite files in arbitrary locations on the storage backend. This can lead to the modification or exposure of sensitive data stored in other buckets or directories, thereby breaching data integrity and confidentiality. The weakness corresponds to CWE‑22, "Improper Restriction of Operations within a File System."

Affected Systems

The vulnerability affects versions of Payload before 3.78.0 that use the storage plug‑ins @payloadcms/storage‑azure, @payloadcms/storage‑gcs, @payloadcms/storage‑r2, or @payloadcms/storage‑s3. Users running Payload on Node.js with any of these storage adapters below the specified version are impacted.

Risk and Exploitability

The CVSS score of 6.5 indicates a moderate severity, while an EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, implying no publicly confirmed exploit. Exploitation requires only that an attacker can initiate a client‑upload request to a vulnerable Payload instance; no additional privileges or insider access are required. The attack vector is inferred to be remote, leveraging the exposed upload API endpoint.

Generated by OpenCVE AI on April 13, 2026 at 21:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Payload to version 3.78.0 or later and ensure the corresponding storage plug‑ins are also at their latest patched releases.

Generated by OpenCVE AI on April 13, 2026 at 21:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-frq9-7j6g-v74x Payload has Insufficient Filename Validation in Client-Upload Signed-URL Endpoints
History

Mon, 13 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:payloadcms:payload:*:*:*:*:*:node.js:*:*

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Payloadcms
Payloadcms payload
Vendors & Products Payloadcms
Payloadcms payload
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Payload is a free and open source headless content management system. Prior to version 3.78.0 in @payloadcms/storage-azure, @payloadcms/storage-gcs, @payloadcms/storage-r2, and @payloadcms/storage-s3, the client-upload signed-URL endpoints for S3, GCS, Azure, and R2 did not properly sanitize filenames. An attacker could craft filenames to escape the intended storage location. This issue has been patched in version 3.78.0 for @payloadcms/storage-azure, @payloadcms/storage-gcs, @payloadcms/storage-r2, and @payloadcms/storage-s3.
Title Payload has Insufficient Filename Validation in Client-Upload Signed-URL Endpoints
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}


Subscriptions

Payloadcms Payload
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-02T15:33:58.886Z

Reserved: 2026-03-30T19:17:10.225Z

Link: CVE-2026-34750

cve-icon Vulnrichment

Updated: 2026-04-02T15:33:32.561Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T20:16:27.337

Modified: 2026-04-13T19:15:38.330

Link: CVE-2026-34750

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:42:06Z

Weaknesses