CVE-2026-28428 PUBLISHED

Talishar: Authentication Bypass via Empty authKey Parameter Allows Unauthenticated Game Actions

Assigner: GitHub_M
Reserved: 27.02.2026 Published: 06.03.2026 Updated: 06.03.2026

Talishar is a fan-made Flesh and Blood project. Prior to commit a9c218e, an authentication bypass vulnerability in Talishar's game endpoint validation logic allows any unauthenticated attacker to perform authenticated game actions — including sending chat messages and submitting game inputs — by supplying an empty authKey parameter (authKey=). The server-side validation uses a loose comparison that accepts an empty string as a valid credential, while correctly rejecting non-empty but incorrect keys. This asymmetry means the authentication mechanism can be completely bypassed without knowing any valid token. This issue has been patched in commit a9c218e.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS Score: 5.3

Product Status

Vendor Talishar
Product Talishar
Versions
  • Version < a9c218efa37756c9e7eed056fbff6ee03f79aefc is affected

References

Problem Types

  • CWE-287: Improper Authentication CWE