OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.10.3, an unauthenticated denial-of-service vulnerability exists in OliveTin’s OAuth2 login flow. Concurrent requests to /oauth/login can trigger unsynchronized access to a shared registeredStates map, causing a Go runtime panic (fatal error: concurrent map writes) and process termination. This allows remote attackers to crash the service when OAuth2 is enabled. This issue has been patched in version 3000.10.3.
References
| Link | Resource |
|---|---|
| https://github.com/OliveTin/OliveTin/commit/f044d90d5525c4c8e3f421b32ed7eff771c22d36 | Patch |
| https://github.com/OliveTin/OliveTin/security/advisories/GHSA-45m3-398w-m2m9 | Exploit Vendor Advisory |
| https://github.com/OliveTin/OliveTin/security/advisories/GHSA-45m3-398w-m2m9 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-05 20:16
Updated : 2026-03-10 15:42
NVD link : CVE-2026-28789
Mitre link : CVE-2026-28789
CVE.ORG link : CVE-2026-28789
JSON object : View
Products Affected
olivetin
- olivetin
