Payload is a free and open source headless content management system. Prior to version 3.79.1, certain request inputs were not properly validated. An attacker could craft requests that influence SQL query execution, potentially exposing or modifying data in collections. This issue has been patched in version 3.79.1.
References
| Link | Resource |
|---|---|
| https://github.com/payloadcms/payload/releases/tag/v3.79.1 | Product Release Notes |
| https://github.com/payloadcms/payload/security/advisories/GHSA-7xxh-373w-35vg | Mitigation Vendor Advisory |
Configurations
History
13 Apr 2026, 18:53
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:payloadcms:payload:*:*:*:*:*:node.js:*:* | |
| First Time |
Payloadcms
Payloadcms payload |
|
| References | () https://github.com/payloadcms/payload/releases/tag/v3.79.1 - Product, Release Notes | |
| References | () https://github.com/payloadcms/payload/security/advisories/GHSA-7xxh-373w-35vg - Mitigation, Vendor Advisory |
01 Apr 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-01 20:16
Updated : 2026-04-13 18:53
NVD link : CVE-2026-34747
Mitre link : CVE-2026-34747
CVE.ORG link : CVE-2026-34747
JSON object : View
Products Affected
payloadcms
- payload
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
