@payloadcms/next is vulnerable to Open Redirect
55
Medium Risk
Affected versions of this package are vulnerable to Open Redirect due to insufficient validation of redirect paths in the login flow. An attacker can exploit this to redirect users to malicious websites. This issue is addressed by introducing the getSafeRedirect utility, which ensures redirect paths start with a single /, blocks protocol-relative URLs (e.g., //evil.com), prevents JavaScript scheme execution (e.g., /javascript:alert(1)), and blocks full URL redirects such as /http: or /https:.
You are affected if you are using a version that falls within the vulnerable range.
@payloadcms/next is vulnerable to Open Redirect in versions 3.0.0 - 3.30.0.
Upgrade the @payloadcms/next library to the patch version.
Connect your repositories to instantly see whether vulnerable or malicious packages exist in your codebase.
Free. No credit card required.

SOC 2Compliant
ISO 27001Compliant