Authentication Token Exposure in V2Board and Xboard Products
CVE-2026-39912
Key Information:
Badges
What is CVE-2026-39912?
CVE-2026-39912 is a critical security vulnerability found in the V2Board and Xboard software products, specifically impacting versions 1.6.1 through 1.7.4 of V2Board and versions up to 0.1.9 of Xboard. These products are designed to enable user management and network management functionalities, often utilized in various online service applications. The vulnerability arises from the exposure of authentication tokens within HTTP response bodies of the loginWithMailLink endpoint, especially when the associated feature is enabled. Unauthenticated attackers can exploit this flaw by sending a POST request with a known email address to receive a complete authentication URL in return. This URL can then be exchanged to obtain a valid bearer token, granting full account access including administrative privileges. The existence of this vulnerability presents a serious risk to organizations utilizing these products, as it could lead to unauthorized access and control over sensitive data and services.
Potential impact of CVE-2026-39912
-
Full Account Compromise: Attackers can gain complete access to user accounts, including those with administrative rights, leading to unauthorized actions within the affected systems.
-
Data Breach Risks: With access to user accounts, malicious actors may steal sensitive information, resulting in potential data breaches and loss of confidentiality for both organizations and their users.
-
Service Disruption: Unauthorized access can lead to malicious modifications or disruptions in service, affecting operational integrity and potentially causing downtime for the organization’s services.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
v2board 1.6.1 <= 1.7.4
v2board bdb10bed32c5f37df2f0872c3cb354e9b7a293bd <= 0ca47622a50116d0ddd7ffb316b157afb57d25e8
Xboard 0 <= 0.1.9
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
