CVE-2026-34456
CRITICALReviactyl: OAuth account takeover via auto-linking
Title source: cnaDescription
Reviactyl is an open-source game server management panel built using Laravel, React, FilamentPHP, Vite, and Go. From version 26.2.0-beta.1 to before version 26.2.0-beta.5, a vulnerability in the OAuth authentication flow allowed automatic linking of social accounts based solely on matching email addresses. An attacker could create or control a social account (e.g., Google, GitHub, Discord) using a victim’s email address and gain full access to the victim's account without knowing their password. This results in a full account takeover with no prior authentication required. This issue has been patched in version 26.2.0-beta.5.
Scores
CVSS v3
9.1
EPSS
0.0009
EPSS Percentile
25.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-284
Status
published
Products (2)
reviactyl/panel
>= 26.2.0-beta.1, < 26.2.0-beta.5
reviactyl/reviactyl
26.2.0 beta1 (4 CPE variants)
Published
Apr 01, 2026
Tracked Since
Apr 02, 2026