Payload is a free and open source headless content management system. Prior to 3.73.0, when querying JSON or richText fields, user input was directly embedded into SQL without escaping, enabling blind SQL injection attacks. An unauthenticated attacker could extract sensitive data (emails, password reset tokens) and achieve full account takeover without password cracking. This vulnerability is fixed in 3.73.0.
History

Fri, 06 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
Description Payload is a free and open source headless content management system. Prior to 3.73.0, when querying JSON or richText fields, user input was directly embedded into SQL without escaping, enabling blind SQL injection attacks. An unauthenticated attacker could extract sensitive data (emails, password reset tokens) and achieve full account takeover without password cracking. This vulnerability is fixed in 3.73.0.
Title Payload has an SQL Injection in JSON/RichText Queries on PostgreSQL/SQLite Adapters
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-06T21:07:01.122Z

Reserved: 2026-02-02T19:59:47.375Z

Link: CVE-2026-25544

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-06T22:16:11.597

Modified: 2026-02-06T22:16:11.597

Link: CVE-2026-25544

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.