CVE-2026-34456

CRITICAL

Reviactyl: OAuth account takeover via auto-linking

Title source: cna

Description

Reviactyl is an open-source game server management panel built using Laravel, React, FilamentPHP, Vite, and Go. From version 26.2.0-beta.1 to before version 26.2.0-beta.5, a vulnerability in the OAuth authentication flow allowed automatic linking of social accounts based solely on matching email addresses. An attacker could create or control a social account (e.g., Google, GitHub, Discord) using a victim’s email address and gain full access to the victim's account without knowing their password. This results in a full account takeover with no prior authentication required. This issue has been patched in version 26.2.0-beta.5.

Scores

CVSS v3 9.1
EPSS 0.0009
EPSS Percentile 25.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact total

Details

CWE
CWE-284
Status published
Products (2)
reviactyl/panel >= 26.2.0-beta.1, < 26.2.0-beta.5
reviactyl/reviactyl 26.2.0 beta1 (4 CPE variants)
Published Apr 01, 2026
Tracked Since Apr 02, 2026