Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-7xxh-373w-35vg | Payload has an SQL Injection via Query Handling |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 04 Apr 2026 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Payloadcms
Payloadcms payload |
|
| Vendors & Products |
Payloadcms
Payloadcms payload |
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Payload is a free and open source headless content management system. Prior to version 3.79.1, certain request inputs were not properly validated. An attacker could craft requests that influence SQL query execution, potentially exposing or modifying data in collections. This issue has been patched in version 3.79.1. | |
| Title | Payload has an SQL Injection via Query Handling | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-04T03:07:40.291Z
Reserved: 2026-03-30T19:17:10.224Z
Link: CVE-2026-34747
Updated: 2026-04-04T03:07:35.974Z
Status : Undergoing Analysis
Published: 2026-04-01T20:16:26.887
Modified: 2026-04-03T16:10:52.680
Link: CVE-2026-34747
No data.
OpenCVE Enrichment
Updated: 2026-04-02T20:16:51Z
Github GHSA