CVE-2026-39912 PUBLISHED

v2board / Xboard Authentication Token Exposure via loginWithMailLink

Assigner: VulnCheck
Reserved: 07.04.2026 Published: 09.04.2026 Updated: 09.04.2026

V2Board 1.6.1 through 1.7.4 and Xboard through 0.1.9 expose authentication tokens in HTTP response bodies of the loginWithMailLink endpoint when the login_with_mail_link_enable feature is active. Unauthenticated attackers can POST to the loginWithMailLink endpoint with a known email address to receive the full authentication URL in the response, then exchange the token at the token2Login endpoint to obtain a valid bearer token with complete account access including admin privileges.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 9.1

Product Status

Vendor v2board
Product v2board
Versions Default: unknown
  • affected from 1.6.1 to 1.7.4 (incl.)
  • affected from bdb10bed32c5f37df2f0872c3cb354e9b7a293bd to 0ca47622a50116d0ddd7ffb316b157afb57d25e8 (incl.)
Vendor cedar2025
Product Xboard
Versions Default: unaffected
  • affected from 0 to 0.1.9 (incl.)
  • Version 121511523f04882ec0c7447acd9b8ebcb8a47957 is unaffected

Credits

  • Valentin Lobstein (Chocapikk) finder

References

Problem Types

  • CWE-201 Insertion of Sensitive Information Into Sent Data CWE