Логотип exploitDog
bind:CVE-2026-25544
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-25544

Количество 2

Количество 2

nvd логотип

CVE-2026-25544

около 2 месяцев назад

Payload is a free and open source headless content management system. Prior to 3.73.0, when querying JSON or richText fields, user input was directly embedded into SQL without escaping, enabling blind SQL injection attacks. An unauthenticated attacker could extract sensitive data (emails, password reset tokens) and achieve full account takeover without password cracking. This vulnerability is fixed in 3.73.0.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-xx6w-jxg9-2wh8

около 2 месяцев назад

@payloadcms/drizzle has SQL Injection in JSON/RichText Queries on PostgreSQL/SQLite Adapters

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-25544

Payload is a free and open source headless content management system. Prior to 3.73.0, when querying JSON or richText fields, user input was directly embedded into SQL without escaping, enabling blind SQL injection attacks. An unauthenticated attacker could extract sensitive data (emails, password reset tokens) and achieve full account takeover without password cracking. This vulnerability is fixed in 3.73.0.

CVSS3: 9.8
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-xx6w-jxg9-2wh8

@payloadcms/drizzle has SQL Injection in JSON/RichText Queries on PostgreSQL/SQLite Adapters

CVSS3: 9.8
0%
Низкий
около 2 месяцев назад

Уязвимостей на страницу