๐Ÿ” CVE Alert

CVE-2026-41574

UNKNOWN 0.0

Nhost Vulnerable to Account Takeover via OAuth Email Verification Bypass

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Nhost is an open source Firebase alternative with GraphQL. Prior to version 0.49.1, Nhost automatically links an incoming OAuth identity to an existing Nhost account when the email addresses match. This is only safe when the email has been verified by the OAuth provider. Nhost's controller trusts a profile.EmailVerified boolean that is set by each provider adapter. The vulnerability is that several provider adapters do not correctly populate this field they either silently drop a verified field the provider API actually returns (Discord), or they fall back to accepting unconfirmed emails and marking them as verified (Bitbucket). Two Microsoft providers (AzureAD, EntraID) derive the email from non-ownership-proving fields like the user principal name, then mark it verified. The result is that an attacker can present an email they don't own to Nhost, have the OAuth identity merged into the victim's account, and receive a full authenticated session. This issue has been patched in version 0.49.1.

CWE CWE-287
Vendor nhost
Product nhost
Published May 8, 2026
Last Updated May 8, 2026
Stay Ahead of the Next One

Get instant alerts for nhost nhost

Be the first to know when new unknown vulnerabilities affecting nhost nhost are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

nhost / nhost
< 0.49.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/nhost/nhost/security/advisories/GHSA-6g38-8j4p-j3pr github.com: https://github.com/nhost/nhost/pull/4162 github.com: https://github.com/nhost/nhost/commit/ec8dab3f2cf46e1131ddaf893d56c37aa00380b2 github.com: https://github.com/nhost/nhost/releases/tag/auth%400.49.1