CVE-2026-34748
🟡 Monitoruj
XSS w panelu administracyjnym Payload umożliwia wykonanie kodu w przeglądarce innego użytkownika.
CVSS
8.7
EPSS
0.0%
Exploit
none
Vendor
payloadcms
Opis źródłowy (NVD)
Payload is a free and open source headless content management system. Prior to version 3.78.0 in @payloadcms/next, a stored Cross-Site Scripting (XSS) vulnerability existed in the admin panel. An authenticated user with write access to a collection could save content that, when viewed by another user, would execute in their browser. This issue has been patched in version 3.78.0.
xss
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.7 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-04-01 20:16:27 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-13 19:13:21 UTC |
Referencje
- https://github.com/payloadcms/payload/security/advisories/GHSA-mmxc-95ch-2j7c (security-advisories@github.com) [Mitigation, Vendor Advisory]