Home

Description

Talishar is a fan-made Flesh and Blood project. Prior to commit a9c218e, an authentication bypass vulnerability in Talishar's game endpoint validation logic allows any unauthenticated attacker to perform authenticated game actions — including sending chat messages and submitting game inputs — by supplying an empty authKey parameter (authKey=). The server-side validation uses a loose comparison that accepts an empty string as a valid credential, while correctly rejecting non-empty but incorrect keys. This asymmetry means the authentication mechanism can be completely bypassed without knowing any valid token. This issue has been patched in commit a9c218e.

PUBLISHED Reserved 2026-02-27 | Published 2026-03-06 | Updated 2026-03-06 | Assigner GitHub_M




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-287: Improper Authentication

Product status

< a9c218efa37756c9e7eed056fbff6ee03f79aefc
affected

References

github.com/...lishar/security/advisories/GHSA-2659-p579-wv83

github.com/...ommit/a9c218efa37756c9e7eed056fbff6ee03f79aefc

cve.org (CVE-2026-28428)

nvd.nist.gov (CVE-2026-28428)

Download JSON