Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-39912— v2board / Xboard Authentication Token Exposure via loginWithMailLink

CVSS 9.1 · Critical EPSS 0.07% · P21
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-39912

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
v2board / Xboard Authentication Token Exposure via loginWithMailLink
Source: NVD (National Vulnerability Database)
Vulnerability Description
V2Board 1.6.1 through 1.7.4 and Xboard through 0.1.9 expose authentication tokens in HTTP response bodies of the loginWithMailLink endpoint when the login_with_mail_link_enable feature is active. Unauthenticated attackers can POST to the loginWithMailLink endpoint with a known email address to receive the full authentication URL in the response, then exchange the token at the token2Login endpoint to obtain a valid bearer token with complete account access including admin privileges.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
通过发送数据的信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
V2Board 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
V2Board是V2Board开源的一个多用户代理服务管理面板。 V2Board 1.6.1至1.7.4版本和Xboard 0.1.9及之前版本存在安全漏洞,该漏洞源于loginWithMailLink端点的HTTP响应体中暴露身份验证令牌,可能导致未认证攻击者获取完整账户访问权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
v2boardv2board 1.6.1 ~ 1.7.4 -
cedar2025Xboard 0 ~ 0.1.9 -

II. Public POCs for CVE-2026-39912

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium
Qwen3.6-35B-A3B · 10124 chars
Paid plan includes:
In-depth vulnerability mechanism
Trigger conditions & impact
Full executable POC code
Exploit chain & mitigation
POC zip download
100+ AI POC generations per month

III. Intelligence Information for CVE-2026-39912

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-39912

No comments yet


Leave a comment