PocketBase vulnerable to account pre-hijacking via OAuth2 unverfied->verified autolinking upgrade — CVE-2026-44166
GitHub · GitHub · CVE-2026-44166
ID
CVE-2026-44166
CVE-2026-44166
Date
Updated
Activity
Source
GitHub
GitHub
Vendor
GitHub
GitHub
Threat
medium
medium
CVSS
6.1
6.1
EPSS
0.00041
0.00041
Summary
A pre-hijacking issue was discovered with the OAuth2 autolinking by [Alardiians](https://github.com/Alardiians). In some situations, if an attacker knows the email address of the victim they can create and link an **unverified** PocketBase user in advance by authenticating with one of the OAuth2 app providers, e.g. "A". When the victim gets invited or decides to sign up to your app on their own with provider "B"…
Product
go: github.com/pocketbase/pocketbase
What to do
General, cautious steps (verify details in the official source):
- Review exposure and plan remediation based on risk and environment.
- Identify affected product versions in your inventory and verify whether you are impacted.
- Apply vendor patches/updates or recommended mitigations as soon as available.
- Read the official advisory for exact affected versions and remediation steps.