| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6g38-8j4p-j3pr | Nhost Vulnerable to Account Takeover via OAuth Email Verification Bypass |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 09 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nhost
Nhost nhost |
|
| Vendors & Products |
Nhost
Nhost nhost |
Fri, 08 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nhost is an open source Firebase alternative with GraphQL. Prior to version 0.49.1, Nhost automatically links an incoming OAuth identity to an existing Nhost account when the email addresses match. This is only safe when the email has been verified by the OAuth provider. Nhost's controller trusts a profile.EmailVerified boolean that is set by each provider adapter. The vulnerability is that several provider adapters do not correctly populate this field they either silently drop a verified field the provider API actually returns (Discord), or they fall back to accepting unconfirmed emails and marking them as verified (Bitbucket). Two Microsoft providers (AzureAD, EntraID) derive the email from non-ownership-proving fields like the user principal name, then mark it verified. The result is that an attacker can present an email they don't own to Nhost, have the OAuth identity merged into the victim's account, and receive a full authenticated session. This issue has been patched in version 0.49.1. | |
| Title | Nhost Vulnerable to Account Takeover via OAuth Email Verification Bypass | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-08T23:25:43.790Z
Reserved: 2026-04-21T14:15:21.957Z
Link: CVE-2026-41574
Updated: 2026-05-08T23:25:36.752Z
Status : Awaiting Analysis
Published: 2026-05-08T15:16:40.580
Modified: 2026-05-08T16:02:14.343
Link: CVE-2026-41574
No data.
OpenCVE Enrichment
Updated: 2026-05-08T23:15:20Z
Github GHSA