The vulnerability is a critical account takeover flaw within Nhost's authentication flow. The root cause is a combination of issues in the OAuth provider integrations and the central sign-in controller. Several OAuth provider adapters (Discord, Bitbucket, AzureAD, EntraID) incorrectly determined the email verification status. They either ignored explicit verification flags from the provider, used insecure fallbacks, or simply assumed an email was verified if it was present. This incorrect verification status was then consumed by the providerFlowSignIn function, which trusted the boolean and proceeded to link the OAuth identity to an existing Nhost account if the email addresses matched. This allowed an attacker to create an account on an external OAuth provider with a victim's email address, and without verifying it, sign into the Nhost application and take over the victim's account. The patch addresses this by implementing stricter checks in the central controller (providerFlowSignIn) to require explicit email verification before linking accounts, and by fixing the individual provider adapters to correctly report the verification status.