Payload is a free and open source headless content management system. Prior to version 3.78.0 in @payloadcms/next, a stored Cross-Site Scripting (XSS) vulnerability existed in the admin panel. An authenticated user with write access to a collection could save content that, when viewed by another user, would execute in their browser. This issue has been patched in version 3.78.0.
References
| Link | Resource |
|---|---|
| https://github.com/payloadcms/payload/security/advisories/GHSA-mmxc-95ch-2j7c | Mitigation Vendor Advisory |
Configurations
History
13 Apr 2026, 19:13
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Payloadcms
Payloadcms payload |
|
| CPE | cpe:2.3:a:payloadcms:payload:*:*:*:*:*:node.js:*:* | |
| References | () https://github.com/payloadcms/payload/security/advisories/GHSA-mmxc-95ch-2j7c - Mitigation, Vendor Advisory |
01 Apr 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-01 20:16
Updated : 2026-04-13 19:13
NVD link : CVE-2026-34748
Mitre link : CVE-2026-34748
CVE.ORG link : CVE-2026-34748
JSON object : View
Products Affected
payloadcms
- payload
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
