CVE-2026-34456
Reviactyl: OAuth account takeover via auto-linking
Reviactyl is an open-source game server management panel built using Laravel, React, FilamentPHP, Vite, and Go. From version 26.2.0-beta.1 to before version 26.2.0-beta.5, a vulnerability in the OAuth authentication flow allowed automatic linking of social accounts based solely on matching email addresses. An attacker could create or control a social account (e.g., Google, GitHub, Discord) using a victimβs email address and gain full access to the victim's account without knowing their password. This results in a full account takeover with no prior authentication required. This issue has been patched in version 26.2.0-beta.5.
| CWE | CWE-284 |
| Vendor | reviactyl |
| Product | panel |
| Published | Apr 1, 2026 |
| Last Updated | Apr 2, 2026 |
Get instant alerts for reviactyl panel
Be the first to know when new critical vulnerabilities affecting reviactyl panel are published β delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N