Untriaged
Permalink
CVE-2026-34749
5.4 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): LOW
- Availability impact (A): LOW
Payload has a CSRF Protection Bypass in Authentication Flow
Payload is a free and open source headless content management system. Prior to version 3.79.1, a Cross-Site Request Forgery (CSRF) vulnerability exists in the authentication flow. Under certain conditions, the configured CSRF protection could be bypassed, allowing cross-site requests to be made. This issue has been patched in version 3.79.1.
References
-
https://github.com/payloadcms/payload/security/advisories/GHSA-p6mr-xf3r-ghq4 x_refsource_CONFIRM
-
https://github.com/payloadcms/payload/releases/tag/v3.79.1 x_refsource_MISC
Affected products
payload
- ==< 3.79.1
Matching in nixpkgs
pkgs.payload_dumper
Android OTA payload dumper
-
nixos-unstable 0-unstable-2022-04-11
- nixpkgs-unstable 0-unstable-2022-04-11
- nixos-unstable-small 0-unstable-2022-04-11
-
nixos-25.11 0-unstable-2022-04-11
- nixos-25.11-small 0-unstable-2022-04-11
- nixpkgs-25.11-darwin 0-unstable-2022-04-11
pkgs.payload-dumper-go
Android OTA payload dumper written in Go
pkgs.payloadsallthethings
List of useful payloads and bypass for Web Application Security and Pentest/CTF
pkgs.android-ota-payload-extractor
A fast & natively cross-platform Android OTA payload extractor written in Go
Package maintainers
-
@Aleksanaa Aleksana QwQ <me@aleksana.moe>
-
@DamienCassou Damien Cassou <damien@cassou.me>
-
@shard77 Léon Gessner <sh7user@gmail.com>
-
@johnrtitor Masum Reza <masumrezarock100@gmail.com>
-
@RossComputerGuy Tristan Ross <tristan.ross@midstall.com>
-
@hadilq Hadi Lashkari Ghouchani <hadilq.dev@gmail.com>
-
@MatthewCroughan Matthew Croughan <matt@croughan.sh>
-
@numinit Morgan Jones <me+nixpkgs@numin.it>
-
@adrian-gierakowski Adrian Gierakowski <adrian.gierakowski@gmail.com>