- Description
- Payload is a free and open source headless content management system. Prior to version 3.79.1, certain request inputs were not properly validated. An attacker could craft requests that influence SQL query execution, potentially exposing or modifying data in collections. This issue has been patched in version 3.79.1.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
- Products
- payload
CVSS 3.1
- Type
- Primary
- Base score
- 8.2
- Impact score
- 4.2
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
- Severity
- HIGH
- security-advisories@github.com
- CWE-89
- Hype score
- Not currently trending
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:payloadcms:payload:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "B4AE65F8-450D-4573-9CD7-1AA42CE5DC28",
"versionEndExcluding": "3.79.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]