OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.10.3, an unauthenticated denial-of-service vulnerability exists in OliveTin’s OAuth2 login flow. Concurrent requests to /oauth/login can trigger unsynchronized access to a shared registeredStates map, causing a Go runtime panic (fatal error: concurrent map writes) and process termination. This allows remote attackers to crash the service when OAuth2 is enabled. This issue has been patched in version 3000.10.3.
Use CWE-362, Olivetin vendor hub and Olivetin product page to widen CVE-2026-28789 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-27626, CVE-2026-30223 and CVE-2026-31817 for nearby disclosures in the same product family.