Payload has released version 3.79.1 to address multiple vulnerabilities, including unvalidated input in password recovery, SQL injection, and CSRF bypass. These flaws could allow attackers to perform unauthorized actions or access sensitive data. Users of Payload are urged to upgrade to the latest version to mitigate these risks.
The highest CVSS score is 9.1, indicating a critical vulnerability with potentially severe impact.
What is Payload?
CVE-2026-34751: Unvalidated Input in Password Recovery
Critical vulnerability; attacker can perform actions on behalf of user.
EPSS score of 0.04 indicates a low probability of exploitation.
The password recovery flow in Payload versions prior to 3.79.1 contains a vulnerability due to unvalidated input. An attacker could exploit this to perform actions on behalf of a user initiating a password reset.
How to fix CVE-2026-34751 in Payload
Patch immediately- 1.Upgrade to Payload version v3.79.1 or later.
npm update payloadVerify with:
payload --versionWorkaround: There are no complete workarounds. Upgrading to v3.79.1 is recommended.
NextGuard automatically flags CVE-2026-34751 if Payload appears in any of your monitored projects — no manual lookup required.
CVE-2026-34747: SQL Injection via Query Handling
High severity; attacker can potentially expose or modify data.
EPSS score of 0.048 indicates a low probability of exploitation.
Improper input validation in Payload's query handling allows for SQL injection attacks. An attacker could craft malicious requests to influence SQL query execution, potentially exposing or modifying data in collections.
How to fix CVE-2026-34747 in Payload
Patch immediately- 1.Upgrade to Payload version v3.79.1 or later.
npm update payloadVerify with:
payload --versionWorkaround: Until developers can upgrade, limit access to endpoints that accept dynamic query inputs to trusted users only. Validate or sanitize input from untrusted clients before sending it to query endpoints.
NextGuard automatically flags CVE-2026-34747 if Payload appears in any of your monitored projects — no manual lookup required.
CVE-2026-34749: CSRF Protection Bypass in Authentication Flow
Medium severity; CSRF bypass in authentication flow.
EPSS score of 0.019 indicates a very low probability of exploitation.
A CSRF vulnerability exists in Payload's authentication flow, potentially allowing cross-site requests to bypass configured CSRF protection. This could enable attackers to perform unauthorized actions on behalf of authenticated users.
How to fix CVE-2026-34749 in Payload
Patch within 7 days- 1.Upgrade to Payload version v3.79.1 or later.
npm update payloadVerify with:
payload --versionWorkaround: There is no complete workaround without upgrading. If consumers cannot upgrade immediately, setting `cookies.sameSite` to `'Strict'` will prevent the session cookie from being sent cross-site. However, this will also require users to re-authenticate when navigating to the application from external links (e.g. email, other sites).
NextGuard automatically flags CVE-2026-34749 if Payload appears in any of your monitored projects — no manual lookup required.
Stay ahead of nodejs vulnerabilities
Proactively detect and remediate vulnerabilities in your nodejs projects. Use NextGuard to monitor your nodejs dependencies for known CVEs.
Compare PlansFrequently asked questions
Payload users should upgrade to v3.79.1 to address these critical security issues. Stay informed about the latest nodejs security threats and see all nodejs vulnerabilities. Regularly updating your dependencies is crucial for maintaining a secure application.
Related topics