Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hp5w-3hxx-vmwf | Payload: Pre-Authentication Account Takeover via Parameter Injection in Password Recovery |
Wed, 15 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:payloadcms:payload:*:*:*:*:*:node.js:*:* |
Sat, 04 Apr 2026 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Payloadcms
Payloadcms payload |
|
| Vendors & Products |
Payloadcms
Payloadcms payload |
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Payload is a free and open source headless content management system. Prior to version 3.79.1 in @payloadcms/graphql and payload, a vulnerability in the password recovery flow could allow an unauthenticated attacker to perform actions on behalf of a user who initiates a password reset. This issue has been patched in version 3.79.1 for @payloadcms/graphql and payload. | |
| Title | Payload has Unvalidated Input in Password Recovery Endpoints | |
| Weaknesses | CWE-472 CWE-640 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-04T03:06:17.817Z
Reserved: 2026-03-30T19:17:10.225Z
Link: CVE-2026-34751
Updated: 2026-04-04T03:06:13.779Z
Status : Analyzed
Published: 2026-04-01T18:16:31.277
Modified: 2026-04-15T14:36:31.277
Link: CVE-2026-34751
No data.
OpenCVE Enrichment
Updated: 2026-04-02T20:16:56Z
Github GHSA