Skip to main content
MemCyber
High CVSS 7.5 Admin Panel Exposure HackerOne

Disclosure

Okta DEV Tenant Serving Production Authentication

The production login portal at login.[vendor] is backed by an Okta tenant named my-[vendor]-dev, explicitly indicating a DEVELOPMENT environment is serving production authentication. The admin panel at my-[vendor]-dev-admin.okta.com is accessible and redirects to OIDC SSO login

Target
SEA Gaming Marketplace
Category
Admin Panel Exposure
Channel
HackerOne
Disclosed
2026-03

Redaction note

Vendor identity withheld.

This finding is documented here as part of MemCyber’s public disclosure record. The vendor has been anonymized to a sector and region descriptor. Full technical detail — including root cause, reproducible proof-of-concept, remediation guidance, and vendor attribution where granted — is available to qualified prospects under NDA.

Coordinated disclosure

How we handled it.

  • Reported to the vendor via HackerOne with a reproducible proof-of-concept.
  • Triage + remediation window coordinated with the vendor security team.
  • Fix verified before any public reference.
  • This record published only after the embargo period closed.

Similar category

Want the full technical detail?

Named vendor, PoC, remediation — shared under NDA.