CVE-2026-34456 PUBLISHED

Reviactyl: OAuth account takeover via auto-linking

Assigner: GitHub_M
Reserved: 27.03.2026 Published: 01.04.2026 Updated: 02.04.2026

Reviactyl is an open-source game server management panel built using Laravel, React, FilamentPHP, Vite, and Go. From version 26.2.0-beta.1 to before version 26.2.0-beta.5, a vulnerability in the OAuth authentication flow allowed automatic linking of social accounts based solely on matching email addresses. An attacker could create or control a social account (e.g., Google, GitHub, Discord) using a victim’s email address and gain full access to the victim's account without knowing their password. This results in a full account takeover with no prior authentication required. This issue has been patched in version 26.2.0-beta.5.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVSS Score: 9.1

Product Status

Vendor reviactyl
Product panel
Versions
  • Version >= 26.2.0-beta.1, < 26.2.0-beta.5 is affected

References

Problem Types

  • CWE-284: Improper Access Control CWE