Skip to content

Commit 228e756

Browse files
1 parent 779a16c commit 228e756

1 file changed

Lines changed: 7 additions & 3 deletions

File tree

advisories/github-reviewed/2026/04/GHSA-hp5w-3hxx-vmwf/GHSA-hp5w-3hxx-vmwf.json

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hp5w-3hxx-vmwf",
4-
"modified": "2026-04-01T16:08:02Z",
4+
"modified": "2026-04-08T18:19:10Z",
55
"published": "2026-04-01T16:08:02Z",
66
"aliases": [
77
"CVE-2026-34751"
88
],
9-
"summary": "Payload has Unvalidated Input in Password Recovery Endpoints",
9+
"summary": "Payload: Pre-Authentication Account Takeover via Parameter Injection in Password Recovery",
1010
"details": "### Impact\n\nA vulnerability in the password recovery flow could allow an unauthenticated attacker to perform actions on behalf of a user who initiates a password reset.\n\nUsers are affected if:\n\n- They are using Payload version **< v3.79.1** with any auth-enabled collection using the built-in `forgot-password` functionality.\n\n### Patches\n\nInput validation and URL construction in the password recovery flow have been hardened.\n\nUsers should upgrade to **v3.79.1** or later.\n\n### Workarounds\n\nThere are no complete workarounds. Upgrading to **v3.79.1** is recommended.",
1111
"severity": [
1212
{
@@ -59,6 +59,10 @@
5959
"type": "WEB",
6060
"url": "https://github.com/payloadcms/payload/security/advisories/GHSA-hp5w-3hxx-vmwf"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34751"
65+
},
6266
{
6367
"type": "PACKAGE",
6468
"url": "https://github.com/payloadcms/payload"
@@ -76,6 +80,6 @@
7680
"severity": "CRITICAL",
7781
"github_reviewed": true,
7882
"github_reviewed_at": "2026-04-01T16:08:02Z",
79-
"nvd_published_at": null
83+
"nvd_published_at": "2026-04-01T18:16:31Z"
8084
}
8185
}

0 commit comments

Comments
 (0)