CVE-2026-34456
Received Received - Intake
OAuth Authentication Bypass in Reviactyl Enables Full Account Takeover

Publication date: 2026-04-01

Last updated on: 2026-04-15

Assigner: GitHub, Inc.

Description
Reviactyl is an open-source game server management panel built using Laravel, React, FilamentPHP, Vite, and Go. From version 26.2.0-beta.1 to before version 26.2.0-beta.5, a vulnerability in the OAuth authentication flow allowed automatic linking of social accounts based solely on matching email addresses. An attacker could create or control a social account (e.g., Google, GitHub, Discord) using a victim’s email address and gain full access to the victim's account without knowing their password. This results in a full account takeover with no prior authentication required. This issue has been patched in version 26.2.0-beta.5.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-01
Last Modified
2026-04-15
Generated
2026-05-07
AI Q&A
2026-04-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
reviactyl reviactyl 26.2.0
reviactyl reviactyl 26.2.0
reviactyl reviactyl 26.2.0
reviactyl reviactyl 26.2.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability allows an attacker to take over your Reviactyl account without needing your password or any prior authentication.

Once the attacker controls your account, they can access all data and perform any actions available to you within the panel, leading to a full compromise of your account.

Because the attack can be performed remotely over the network with low complexity and no user interaction, it poses a severe security risk.


Can you explain this vulnerability to me?

CVE-2026-34456 is a critical vulnerability in the OAuth authentication flow of the Reviactyl game server management panel. The issue occurs because the system automatically links social login accounts to existing user accounts based solely on matching email addresses.

An attacker can create or control a social account (such as Google, GitHub, or Discord) using the victim's email address and gain full access to the victim's Reviactyl account without knowing their password or any prior authentication.

This automatic linking behavior was removed in the patched version 26.2.0-beta.5, which now requires users to manually link social accounts after authenticating with their email and password.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability immediately, you should upgrade the reviactyl panel to version 26.2.0-beta.5 or later, where the issue has been patched.

As a temporary mitigation before upgrading, disable all OAuth login providers to reduce exposure to the vulnerability.

The patch removes automatic linking of social accounts based on email matching and requires manual linking after user authentication, preventing unauthorized account takeover.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an attacker to take over user accounts without authentication by exploiting automatic linking of social accounts based on email addresses. This results in unauthorized access to sensitive user data and full account control.

Such unauthorized access and potential data exposure can lead to violations of data protection regulations like GDPR and HIPAA, which require strict controls on access to personal and sensitive information.

Because the vulnerability compromises confidentiality and integrity of user accounts, affected organizations may face compliance risks, including failure to protect personal data adequately and potential legal and financial consequences.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves automatic linking of social login accounts based solely on matching email addresses in the OAuth authentication flow of the reviactyl/panel. Detection would primarily involve verifying the version of the reviactyl panel software running on your system.

You can detect if your system is vulnerable by checking the installed version of the reviactyl panel. Versions from 26.2.0-beta.1 up to but not including 26.2.0-beta.5 are affected.

Suggested commands to check the installed version depend on your deployment method. For example, if you have access to the panel's source code or installation directory, you might check the version via Git or package manager commands.

  • Run `git -C /path/to/reviactyl/panel describe --tags` to get the current version if installed via Git.
  • Check the version in the composer.json or composer.lock files if using Composer.
  • Look for the version in the application UI or about page if available.

Additionally, monitoring login attempts via OAuth providers for suspicious automatic account linking behavior could indicate exploitation attempts, but no specific network or system commands are provided in the available resources.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart