From 9bde49a057f52e2dda5bac5a1e1e3bfc19c2094c Mon Sep 17 00:00:00 2001 From: wsk3r <106767133+wsk3r@users.noreply.github.com> Date: Wed, 1 Apr 2026 21:03:07 +0400 Subject: [PATCH] Improve GHSA-hp5w-3hxx-vmwf --- .../2026/04/GHSA-hp5w-3hxx-vmwf/GHSA-hp5w-3hxx-vmwf.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/advisories/github-reviewed/2026/04/GHSA-hp5w-3hxx-vmwf/GHSA-hp5w-3hxx-vmwf.json b/advisories/github-reviewed/2026/04/GHSA-hp5w-3hxx-vmwf/GHSA-hp5w-3hxx-vmwf.json index 221c131479d93..974bbf0990ab7 100644 --- a/advisories/github-reviewed/2026/04/GHSA-hp5w-3hxx-vmwf/GHSA-hp5w-3hxx-vmwf.json +++ b/advisories/github-reviewed/2026/04/GHSA-hp5w-3hxx-vmwf/GHSA-hp5w-3hxx-vmwf.json @@ -1,12 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-hp5w-3hxx-vmwf", - "modified": "2026-04-01T16:08:02Z", + "modified": "2026-04-01T16:08:06Z", "published": "2026-04-01T16:08:02Z", "aliases": [ "CVE-2026-34751" ], - "summary": "Payload has Unvalidated Input in Password Recovery Endpoints", + "summary": "Pre-Authentication Account Takeover via Parameter Injection in Password Recovery", "details": "### Impact\n\nA vulnerability in the password recovery flow could allow an unauthenticated attacker to perform actions on behalf of a user who initiates a password reset.\n\nUsers are affected if:\n\n- They are using Payload version **< v3.79.1** with any auth-enabled collection using the built-in `forgot-password` functionality.\n\n### Patches\n\nInput validation and URL construction in the password recovery flow have been hardened.\n\nUsers should upgrade to **v3.79.1** or later.\n\n### Workarounds\n\nThere are no complete workarounds. Upgrading to **v3.79.1** is recommended.", "severity": [ {