Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
{
"schema_version": "1.4.0",
"id": "GHSA-hp5w-3hxx-vmwf",
"modified": "2026-04-01T16:08:02Z",
"modified": "2026-04-01T16:08:06Z",
"published": "2026-04-01T16:08:02Z",
"aliases": [
"CVE-2026-34751"
],
"summary": "Payload has Unvalidated Input in Password Recovery Endpoints",
"summary": "Pre-Authentication Account Takeover via Parameter Injection in Password Recovery",
"details": "### Impact\n\nA vulnerability in the password recovery flow could allow an unauthenticated attacker to perform actions on behalf of a user who initiates a password reset.\n\nUsers are affected if:\n\n- They are using Payload version **< v3.79.1** with any auth-enabled collection using the built-in `forgot-password` functionality.\n\n### Patches\n\nInput validation and URL construction in the password recovery flow have been hardened.\n\nUsers should upgrade to **v3.79.1** or later.\n\n### Workarounds\n\nThere are no complete workarounds. Upgrading to **v3.79.1** is recommended.",
"severity": [
{
Expand Down
Loading