Untriaged
Permalink
CVE-2026-34748
8.7 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): REQUIRED
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): NONE
@payloadcms/next has Stored XSS in Admin Panel
Payload is a free and open source headless content management system. Prior to version 3.78.0 in @payloadcms/next, a stored Cross-Site Scripting (XSS) vulnerability existed in the admin panel. An authenticated user with write access to a collection could save content that, when viewed by another user, would execute in their browser. This issue has been patched in version 3.78.0.
References
-
https://github.com/payloadcms/payload/security/advisories/GHSA-mmxc-95ch-2j7c x_refsource_CONFIRM
Affected products
payload
- ==< 3.78.0
Matching in nixpkgs
pkgs.payload_dumper
Android OTA payload dumper
-
nixos-unstable 0-unstable-2022-04-11
- nixpkgs-unstable 0-unstable-2022-04-11
- nixos-unstable-small 0-unstable-2022-04-11
-
nixos-25.11 0-unstable-2022-04-11
- nixos-25.11-small 0-unstable-2022-04-11
- nixpkgs-25.11-darwin 0-unstable-2022-04-11
pkgs.payload-dumper-go
Android OTA payload dumper written in Go
pkgs.payloadsallthethings
List of useful payloads and bypass for Web Application Security and Pentest/CTF
pkgs.android-ota-payload-extractor
A fast & natively cross-platform Android OTA payload extractor written in Go
Package maintainers
-
@Aleksanaa Aleksana QwQ <me@aleksana.moe>
-
@DamienCassou Damien Cassou <damien@cassou.me>
-
@shard77 Léon Gessner <sh7user@gmail.com>
-
@johnrtitor Masum Reza <masumrezarock100@gmail.com>
-
@RossComputerGuy Tristan Ross <tristan.ross@midstall.com>
-
@hadilq Hadi Lashkari Ghouchani <hadilq.dev@gmail.com>
-
@MatthewCroughan Matthew Croughan <matt@croughan.sh>
-
@numinit Morgan Jones <me+nixpkgs@numin.it>
-
@adrian-gierakowski Adrian Gierakowski <adrian.gierakowski@gmail.com>