Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 20 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:talishar:talishar:*:*:*:*:*:*:*:* |
Mon, 09 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Talishar
Talishar talishar |
|
| Vendors & Products |
Talishar
Talishar talishar |
Fri, 06 Mar 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Talishar is a fan-made Flesh and Blood project. Prior to commit a9c218e, an authentication bypass vulnerability in Talishar's game endpoint validation logic allows any unauthenticated attacker to perform authenticated game actions — including sending chat messages and submitting game inputs — by supplying an empty authKey parameter (authKey=). The server-side validation uses a loose comparison that accepts an empty string as a valid credential, while correctly rejecting non-empty but incorrect keys. This asymmetry means the authentication mechanism can be completely bypassed without knowing any valid token. This issue has been patched in commit a9c218e. | |
| Title | Talishar: Authentication Bypass via Empty authKey Parameter Allows Unauthenticated Game Actions | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-09T19:54:28.169Z
Reserved: 2026-02-27T15:54:05.137Z
Link: CVE-2026-28428
Updated: 2026-03-09T19:54:23.944Z
Status : Analyzed
Published: 2026-03-06T05:16:31.607
Modified: 2026-04-20T12:57:06.860
Link: CVE-2026-28428
No data.
OpenCVE Enrichment
Updated: 2026-04-17T12:30:06Z