{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-34456","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-03-27T18:18:14.895Z","datePublished":"2026-04-01T20:00:55.743Z","dateUpdated":"2026-04-02T14:17:01.180Z"},"containers":{"cna":{"title":"Reviactyl: OAuth account takeover via auto-linking","problemTypes":[{"descriptions":[{"cweId":"CWE-284","lang":"en","description":"CWE-284: Improper Access Control","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/reviactyl/panel/security/advisories/GHSA-8mcf-rp68-xhfg","tags":["x_refsource_CONFIRM"],"url":"https://github.com/reviactyl/panel/security/advisories/GHSA-8mcf-rp68-xhfg"},{"name":"https://github.com/reviactyl/panel/commit/fe0c29fc62fefe354c9ab8936dfe30fdb586a896","tags":["x_refsource_MISC"],"url":"https://github.com/reviactyl/panel/commit/fe0c29fc62fefe354c9ab8936dfe30fdb586a896"},{"name":"https://github.com/reviactyl/panel/releases/tag/v26.2.0-beta.5","tags":["x_refsource_MISC"],"url":"https://github.com/reviactyl/panel/releases/tag/v26.2.0-beta.5"}],"affected":[{"vendor":"reviactyl","product":"panel","versions":[{"version":">= 26.2.0-beta.1, < 26.2.0-beta.5","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-04-01T20:00:55.743Z"},"descriptions":[{"lang":"en","value":"Reviactyl is an open-source game server management panel built using Laravel, React, FilamentPHP, Vite, and Go. From version 26.2.0-beta.1 to before version 26.2.0-beta.5, a vulnerability in the OAuth authentication flow allowed automatic linking of social accounts based solely on matching email addresses. An attacker could create or control a social account (e.g., Google, GitHub, Discord) using a victim’s email address and gain full access to the victim's account without knowing their password. This results in a full account takeover with no prior authentication required. This issue has been patched in version 26.2.0-beta.5."}],"source":{"advisory":"GHSA-8mcf-rp68-xhfg","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-02T14:16:51.333124Z","id":"CVE-2026-34456","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-02T14:17:01.180Z"}}]}}