Vulnerability Description
Payload is a free and open source headless content management system. Prior to version 3.78.0 in @payloadcms/next, a stored Cross-Site Scripting (XSS) vulnerability existed in the admin panel. An authenticated user with write access to a collection could save content that, when viewed by another user, would execute in their browser. This issue has been patched in version 3.78.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Payloadcms | Payload | < 3.78.0 |
Related Weaknesses (CWE)
References
- https://github.com/payloadcms/payload/security/advisories/GHSA-mmxc-95ch-2j7cMitigationVendor Advisory
FAQ
What is CVE-2026-34748?
CVE-2026-34748 is a vulnerability with a CVSS score of 8.7 (HIGH). Payload is a free and open source headless content management system. Prior to version 3.78.0 in @payloadcms/next, a stored Cross-Site Scripting (XSS) vulnerability existed in the admin panel. An auth...
How severe is CVE-2026-34748?
CVE-2026-34748 has been rated HIGH with a CVSS base score of 8.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-34748?
Check the references section above for vendor advisories and patch information. Affected products include: Payloadcms Payload.