CVE-2026-34456
Description
Reviactyl is an open-source game server management panel built using Laravel, React, FilamentPHP, Vite, and Go. From version 26.2.0-beta.1 to before version 26.2.0-beta.5, a vulnerability in the OAuth authentication flow allowed automatic linking of social accounts based solely on matching email addresses. An attacker could create or control a social account (e.g., Google, GitHub, Discord) using a victim’s email address and gain full access to the victim's account without knowing their password. This results in a full account takeover with no prior authentication required. This issue has been patched in version 26.2.0-beta.5.
Affected products
4cpe:2.3:a:reviactyl:reviactyl:26.2.0:beta1:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:reviactyl:reviactyl:26.2.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:reviactyl:reviactyl:26.2.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:reviactyl:reviactyl:26.2.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:reviactyl:reviactyl:26.2.0:beta4:*:*:*:*:*:*
Patches
1fe0c29fc62feVulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3- github.com/reviactyl/panel/commit/fe0c29fc62fefe354c9ab8936dfe30fdb586a896nvdPatch
- github.com/reviactyl/panel/security/advisories/GHSA-8mcf-rp68-xhfgnvdMitigationPatchVendor Advisory
- github.com/reviactyl/panel/releases/tag/v26.2.0-beta.5nvdProductRelease Notes
News mentions
0No linked articles in our index yet.