CVE-2026-34751

Payload is a free and open source headless content management system. Prior to version 3.79.1 in @payloadcms/graphql and payload, a vulnerability in the password recovery flow could allow an unauthenticated attacker to perform actions on behalf of a user who initiates a password reset. This issue has been patched in version 3.79.1 for @payloadcms/graphql and payload.
Configurations

Configuration 1 (hide)

cpe:2.3:a:payloadcms:payload:*:*:*:*:*:node.js:*:*

History

15 Apr 2026, 14:36

Type Values Removed Values Added
CPE cpe:2.3:a:payloadcms:payload:*:*:*:*:*:node.js:*:*
First Time Payloadcms
Payloadcms payload
References () https://github.com/payloadcms/payload/releases/tag/v3.79.1 - () https://github.com/payloadcms/payload/releases/tag/v3.79.1 - Product, Release Notes
References () https://github.com/payloadcms/payload/security/advisories/GHSA-hp5w-3hxx-vmwf - () https://github.com/payloadcms/payload/security/advisories/GHSA-hp5w-3hxx-vmwf - Vendor Advisory

01 Apr 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-01 18:16

Updated : 2026-04-15 14:36


NVD link : CVE-2026-34751

Mitre link : CVE-2026-34751

CVE.ORG link : CVE-2026-34751


JSON object : View

Products Affected

payloadcms

  • payload
CWE
CWE-472

External Control of Assumed-Immutable Web Parameter

CWE-640

Weak Password Recovery Mechanism for Forgotten Password