Back to list

PocketBase vulnerable to account pre-hijacking via OAuth2 unverfied->verified autolinking upgrade — CVE-2026-44166

GitHub · GitHub · CVE-2026-44166

ID
CVE-2026-44166
Date
Updated
Activity
Source
GitHub
Vendor
GitHub
Threat
medium
CVSS
6.1
EPSS
0.00041

Summary

A pre-hijacking issue was discovered with the OAuth2 autolinking by [Alardiians](https://github.com/Alardiians). In some situations, if an attacker knows the email address of the victim they can create and link an **unverified** PocketBase user in advance by authenticating with one of the OAuth2 app providers, e.g. "A". When the victim gets invited or decides to sign up to your app on their own with provider "B"…

Product

go: github.com/pocketbase/pocketbase

What to do

General, cautious steps (verify details in the official source):

  • Review exposure and plan remediation based on risk and environment.
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories