Critical severity9.1NVD Advisory· Published Apr 1, 2026· Updated Apr 15, 2026
CVE-2026-34751
CVE-2026-34751
Description
Payload is a free and open source headless content management system. Prior to version 3.79.1 in @payloadcms/graphql and payload, a vulnerability in the password recovery flow could allow an unauthenticated attacker to perform actions on behalf of a user who initiates a password reset. This issue has been patched in version 3.79.1 for @payloadcms/graphql and payload.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
payloadnpm | < 3.79.1 | 3.79.1 |
@payloadcms/graphqlnpm | < 3.79.1 | 3.79.1 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-hp5w-3hxx-vmwfghsaADVISORY
- github.com/payloadcms/payload/security/advisories/GHSA-hp5w-3hxx-vmwfnvdVendor AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-34751ghsaADVISORY
- github.com/payloadcms/payload/releases/tag/v3.79.1nvdProductRelease NotesWEB
News mentions
0No linked articles in our index yet.