Description
V2Board 1.6.1 through 1.7.4 and Xboard through 0.1.9 expose authentication tokens in HTTP response bodies of the loginWithMailLink endpoint when the login_with_mail_link_enable feature is active. Unauthenticated attackers can POST to the loginWithMailLink endpoint with a known email address to receive the full authentication URL in the response, then exchange the token at the token2Login endpoint to obtain a valid bearer token with complete account access including admin privileges.
Published: 2026-04-09
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Account Takeover
Action: Immediate Patch
AI Analysis

Impact

The loginWithMailLink endpoint returns a full authentication URL that contains an authentication token in the HTTP response body when the login_with_mail_link_enable feature is active. An unauthenticated attacker can submit a known email address to this endpoint and receive a complete login URL. By sending that URL to the token2Login endpoint, the attacker obtains a bearer token that grants full account access, including administrative privileges. The flaw is a direct information‑exposure weakness (CWE‑201).

Affected Systems

Versions of cedar2025 Xboard from 0.1.0 through 0.1.9 and v2board from 1.6.1 through 1.7.4 are affected when the login_with_mail_link_enable feature is enabled.

Risk and Exploitability

The CVSS base score of 9.1 marks the vulnerability as critical. An attacker can exploit it from any network location by simply POSTing a known email address to the loginWithMailLink endpoint; no authentication, special permissions, or code execution are required. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog, but the lack of exposure controls and the ease of obtaining valid tokens make the risk immediate and high.

Generated by OpenCVE AI on April 9, 2026 at 21:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade v2board to 1.7.5 or later and Xboard to 0.1.10 or later, where the loginWithMailLink endpoint no longer includes the authentication token in the response.
  • If an upgrade is not possible, disable the login_with_mail_link_enable feature in the configuration to prevent tokens from being exposed.
  • After disabling or updating, verify that the loginWithMailLink endpoint no longer returns a token or full authentication URL in the HTTP response body.

Generated by OpenCVE AI on April 9, 2026 at 21:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Cedar2025
Cedar2025 xboard
V2board
V2board v2board
Vendors & Products Cedar2025
Cedar2025 xboard
V2board
V2board v2board

Thu, 09 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Description V2Board 1.6.1 through 1.7.4 and Xboard through 0.1.9 expose authentication tokens in HTTP response bodies of the loginWithMailLink endpoint when the login_with_mail_link_enable feature is active. Unauthenticated attackers can POST to the loginWithMailLink endpoint with a known email address to receive the full authentication URL in the response, then exchange the token at the token2Login endpoint to obtain a valid bearer token with complete account access including admin privileges.
Title v2board / Xboard Authentication Token Exposure via loginWithMailLink
Weaknesses CWE-201
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

cvssV4_0

{'score': 9.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-09T18:51:49.345Z

Reserved: 2026-04-07T20:57:06.209Z

Link: CVE-2026-39912

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-09T19:16:25.920

Modified: 2026-04-09T19:16:25.920

Link: CVE-2026-39912

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:31:43Z

Weaknesses