LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-34456

CVE-2026-34456 - Vulnerability Analysis

CriticalCVSS: 9.1

Last Updated: April 3, 2026

Reviactyl - Authentication Bypass

Published: April 1, 2026Updated: April 3, 2026Remote Exploitable

Overview

Reviactyl 26.2.0-beta.1 to < 26.2.0-beta.5 contains an authentication bypass caused by automatic social account linking based on email matching, letting attackers take over accounts without prior authentication.

Severity & Score

Severity: Critical
CVSS Score: 9.1
EPSS Score: 6.7%(Probability of exploitation in next 30 days)

Impact

Attackers can fully take over user accounts without knowing passwords, leading to complete account compromise.

Mitigation

Upgrade to version 26.2.0-beta.5 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Apr 2, 2026

šŸ”“ CVE-2026-34456 - Critical (9.1) Reviactyl is an open-source game server management panel built using Laravel, React, FilamentPHP, Vite, and Go. From version 26.2.0-beta.1 to before version 26.2.0-beta.5, a vulnerability in the OAuth authentication flow allowed automatic linking ... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-34456/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-34456
Severity
Critical
CVSS Score
9.1
Type
broken_authentication
Status
unconfirmed
EPSS
6.7%
Social Posts
1

CWE

  • CWE-284

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS Score

6.7%Probability of exploitation in the next 30 days