CVE-2026-39397

Delmare Digital · Payload-Puck Plugin

The @delmaredigital/payload-puck plugin for PayloadCMS bypasses collection-level access controls, allowing unauthorized API access.

Executive summary

An access control bypass in the Payload-Puck plugin for PayloadCMS allows unauthorized users to manipulate data via API endpoints.

Vulnerability

The createPuckPlugin() function incorrectly calls the Payload local API with overrideAccess: true, which ignores all defined collection-level access rules. This effectively disables security for the affected API endpoints, allowing any user to interact with the data.

Business impact

This vulnerability (CVSS 9.4) allows unauthorized access to data managed by the Puck visual page builder. The business impact includes potential unauthorized modification or deletion of content, and exposure of sensitive data, which could lead to significant data integrity loss.

Remediation

Immediate Action: Update the @delmaredigital/payload-puck plugin to version 0.6.23 or later.

Proactive Monitoring: Review API access logs for unauthorized CRUD operations directed toward the /api/puck/* endpoints.

Compensating Controls: Implement external API gateway restrictions to enforce authorization rules if the plugin cannot be updated immediately.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Plugin updates should be applied immediately to restore proper access control. Administrators should also conduct an audit of data touched by the Puck plugin to ensure no unauthorized changes were made while the vulnerability was active.