CVE-2026-28428
Talishar: Authentication Bypass via Empty authKey Parameter Allows Unauthenticated Game Actions
Talishar is a fan-made Flesh and Blood project. Prior to commit a9c218e, an authentication bypass vulnerability in Talishar's game endpoint validation logic allows any unauthenticated attacker to perform authenticated game actions โ including sending chat messages and submitting game inputs โ by supplying an empty authKey parameter (authKey=). The server-side validation uses a loose comparison that accepts an empty string as a valid credential, while correctly rejecting non-empty but incorrect keys. This asymmetry means the authentication mechanism can be completely bypassed without knowing any valid token. This issue has been patched in commit a9c218e.
| CWE | CWE-287 |
| Vendor | talishar |
| Product | talishar |
| Published | Mar 6, 2026 |
| Last Updated | Mar 9, 2026 |
Get instant alerts for talishar talishar
Be the first to know when new medium vulnerabilities affecting talishar talishar are published โ delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N