CVE-2026-34748

Payload is a free and open source headless content management system. Prior to version 3.78.0 in @payloadcms/next, a stored Cross-Site Scripting (XSS) vulnerability existed in the admin panel. An authenticated user with write access to a collection could save content that, when viewed by another user, would execute in their browser. This issue has been patched in version 3.78.0.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:payloadcms:payload:*:*:*:*:*:node.js:*:*

History

13 Apr 2026, 19:13

Type Values Removed Values Added
First Time Payloadcms
Payloadcms payload
CPE cpe:2.3:a:payloadcms:payload:*:*:*:*:*:node.js:*:*
References () https://github.com/payloadcms/payload/security/advisories/GHSA-mmxc-95ch-2j7c - () https://github.com/payloadcms/payload/security/advisories/GHSA-mmxc-95ch-2j7c - Mitigation, Vendor Advisory

01 Apr 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-01 20:16

Updated : 2026-04-13 19:13


NVD link : CVE-2026-34748

Mitre link : CVE-2026-34748

CVE.ORG link : CVE-2026-34748


JSON object : View

Products Affected

payloadcms

  • payload
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')