CVE-2026-34747

Payload is a free and open source headless content management system. Prior to version 3.79.1, certain request inputs were not properly validated. An attacker could craft requests that influence SQL query execution, potentially exposing or modifying data in collections. This issue has been patched in version 3.79.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:payloadcms:payload:*:*:*:*:*:node.js:*:*

History

13 Apr 2026, 18:53

Type Values Removed Values Added
CPE cpe:2.3:a:payloadcms:payload:*:*:*:*:*:node.js:*:*
First Time Payloadcms
Payloadcms payload
References () https://github.com/payloadcms/payload/releases/tag/v3.79.1 - () https://github.com/payloadcms/payload/releases/tag/v3.79.1 - Product, Release Notes
References () https://github.com/payloadcms/payload/security/advisories/GHSA-7xxh-373w-35vg - () https://github.com/payloadcms/payload/security/advisories/GHSA-7xxh-373w-35vg - Mitigation, Vendor Advisory

01 Apr 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-01 20:16

Updated : 2026-04-13 18:53


NVD link : CVE-2026-34747

Mitre link : CVE-2026-34747

CVE.ORG link : CVE-2026-34747


JSON object : View

Products Affected

payloadcms

  • payload
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')