Dismissed
Permalink
CVE-2026-25544
9.8 CRITICAL
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
3 packages
- payload_dumper
- payload-dumper-go
- payloadsallthethings
- @LeSuisse dismissed
Payload has an SQL Injection in JSON/RichText Queries on PostgreSQL/SQLite Adapters
Payload is a free and open source headless content management system. Prior to 3.73.0, when querying JSON or richText fields, user input was directly embedded into SQL without escaping, enabling blind SQL injection attacks. An unauthenticated attacker could extract sensitive data (emails, password reset tokens) and achieve full account takeover without password cracking. This vulnerability is fixed in 3.73.0.
References
- https://github.com/payloadcms/payload/security/advisories/GHSA-xx6w-jxg9-2wh8 x_refsource_CONFIRM
- https://github.com/payloadcms/payload/security/advisories/GHSA-xx6w-jxg9-2wh8 x_refsource_CONFIRM
Affected products
payload
- ==< 3.73.0