Authentication Token Exposure in V2Board and Xboard Products
CVE-2026-39912

9.1CRITICAL

Key Information:

Vendor

V2board

Vendor
CVE Published:
9 April 2026

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2026-39912?

CVE-2026-39912 is a critical security vulnerability found in the V2Board and Xboard software products, specifically impacting versions 1.6.1 through 1.7.4 of V2Board and versions up to 0.1.9 of Xboard. These products are designed to enable user management and network management functionalities, often utilized in various online service applications. The vulnerability arises from the exposure of authentication tokens within HTTP response bodies of the loginWithMailLink endpoint, especially when the associated feature is enabled. Unauthenticated attackers can exploit this flaw by sending a POST request with a known email address to receive a complete authentication URL in return. This URL can then be exchanged to obtain a valid bearer token, granting full account access including administrative privileges. The existence of this vulnerability presents a serious risk to organizations utilizing these products, as it could lead to unauthorized access and control over sensitive data and services.

Potential impact of CVE-2026-39912

  1. Full Account Compromise: Attackers can gain complete access to user accounts, including those with administrative rights, leading to unauthorized actions within the affected systems.

  2. Data Breach Risks: With access to user accounts, malicious actors may steal sensitive information, resulting in potential data breaches and loss of confidentiality for both organizations and their users.

  3. Service Disruption: Unauthorized access can lead to malicious modifications or disruptions in service, affecting operational integrity and potentially causing downtime for the organization’s services.

Affected Version(s)

v2board 1.6.1 <= 1.7.4

v2board bdb10bed32c5f37df2f0872c3cb354e9b7a293bd <= 0ca47622a50116d0ddd7ffb316b157afb57d25e8

Xboard 0 <= 0.1.9

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Valentin Lobstein (Chocapikk)
.