payload@3.23.0-canary.597254e vulnerabilities

Node, React, Headless CMS and Application Framework built on Next.js

  • latest version

    3.56.0

  • latest non vulnerable version

  • first published

    10 years ago

  • latest version published

    1 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the payload package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Insufficient Session Expiration

    payload is a Node, React and MongoDB Headless CMS and Application Framework

    Affected versions of this package are vulnerable to Insufficient Session Expiration due to the failure to invalidate JSON Web Tokens after user log out. An attacker can maintain unauthorised access by reusing a stolen or intercepted token until its expiration date.

    How to fix Insufficient Session Expiration?

    Upgrade payload to version 3.44.0 or higher.

    <3.44.0
    • M
    Insufficient Session Expiration

    payload is a Node, React and MongoDB Headless CMS and Application Framework

    Affected versions of this package are vulnerable to Insufficient Session Expiration due to the reuse of user identifiers in the account creation process. An attacker can gain unauthorised access to a newly created user account by reusing a previously saved JSON Web Token (JWT) after deleting the original account.

    How to fix Insufficient Session Expiration?

    Upgrade payload to version 3.44.0 or higher.

    <3.44.0