TROYANOSYVIRUS
Back to CVEs

CVE-2026-27632

LOW
2.6

Description

Talishar is a fan-made Flesh and Blood project. Prior to commit 6be3871a14c192d1fb8146cdbc76f29f27c1cf48, the Talishar application lacks Cross-Site Request Forgery (CSRF) protections on critical state-changing endpoints, specifically within `SubmitChat.php` and other game interaction handlers. By failing to require unique, unpredictable session tokens, the application allows third-party malicious websites to forge requests on behalf of authenticated users, leading to unauthorized actions within active game sessions. The attacker would need to know both the proper gameName and playerID for the player. The player would also need to be browsing and interact with the infected website while playing a game. The vulnerability is fixed in commit 6be3871a14c192d1fb8146cdbc76f29f27c1cf48.

CVE Details

CVSS v3.1 Score2.6
SeverityLOW
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredLOW
User InteractionREQUIRED
Published2/25/2026
Last Modified2/27/2026
Sourcenvd
Honeypot Sightings0

Affected Products

talishar:talishar

Weaknesses (CWE)

CWE-352

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.