Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27812: CWE-116: Improper Encoding or Escaping of Output in Wei-Shaw sub2api

0
High
VulnerabilityCVE-2026-27812cvecve-2026-27812cwe-116
Published: Thu Feb 26 2026 (02/26/2026, 00:00:10 UTC)
Source: CVE Database V5
Vendor/Project: Wei-Shaw
Product: sub2api

Description

CVE-2026-27812 is a high-severity vulnerability in Wei-Shaw's sub2api platform versions prior to 0. 1. 85. It involves improper encoding or escaping of output related to password reset functionality, specifically a Password Reset Poisoning attack via Host Header or Forwarded Header manipulation. Attackers can inject a malicious domain into password reset links, potentially enabling account takeover without authentication or user interaction. The vulnerability has been fixed in version 0. 1. 85. Until upgrading, disabling the 'forgot password' feature is recommended to mitigate risk. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:26:10 UTC

Technical Analysis

CVE-2026-27812 is a vulnerability classified under CWE-116 (Improper Encoding or Escaping of Output) affecting the sub2api platform by Wei-Shaw, an AI API gateway used to manage API quotas for AI product subscriptions. The flaw exists in versions prior to 0.1.85 and stems from the platform's handling of password reset requests. Specifically, the system improperly trusts and processes Host Header or Forwarded Header values when generating password reset links. This allows an attacker to manipulate these headers to inject an arbitrary domain into the reset URL. Consequently, victims may receive password reset emails containing attacker-controlled links, which can be used to hijack accounts by redirecting users to malicious sites or intercepting reset tokens. The vulnerability requires no authentication or user interaction to exploit, increasing its risk. The CVSS 4.0 score is 8.0 (high severity), reflecting the network attack vector, low complexity, no privileges or user interaction needed, and high impact on confidentiality and integrity. Wei-Shaw has addressed the issue in version 0.1.85. Until patching, disabling the 'forgot password' feature is advised to prevent exploitation. No public exploits have been reported yet, but the vulnerability poses a significant risk to organizations using sub2api for managing AI service subscriptions.

Potential Impact

The primary impact of CVE-2026-27812 is the potential for account takeover through manipulation of password reset links. This compromises the confidentiality and integrity of user accounts on the sub2api platform. Organizations relying on sub2api to manage AI API quotas may face unauthorized access to sensitive subscription data, quota controls, and potentially linked AI services. Attackers could leverage compromised accounts to disrupt service usage, steal subscription benefits, or escalate privileges if linked to broader internal systems. The vulnerability's ease of exploitation without authentication or user interaction increases the likelihood of automated or large-scale attacks. This could lead to reputational damage, financial loss due to subscription misuse, and operational disruption for businesses dependent on AI APIs. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability remains a critical risk until patched.

Mitigation Recommendations

To mitigate CVE-2026-27812, organizations should prioritize upgrading sub2api to version 0.1.85 or later, where the vulnerability is fixed. If immediate upgrading is not feasible, the 'forgot password' feature should be disabled to block the attack vector. Additionally, organizations should implement strict validation and sanitization of Host and Forwarded headers at the web server or application gateway level to prevent header injection attacks. Monitoring password reset request logs for unusual patterns or spikes can help detect exploitation attempts. Employing multi-factor authentication (MFA) on user accounts can reduce the impact of compromised credentials. Security teams should also review email templates and reset link generation logic to ensure no external input is trusted without proper encoding or escaping. Finally, educating users about phishing risks related to password reset emails can help mitigate social engineering attempts leveraging this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T02:31:33.267Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699f8fb4b7ef31ef0b6dc8c1

Added to database: 2/26/2026, 12:11:32 AM

Last enriched: 2/26/2026, 12:26:10 AM

Last updated: 2/26/2026, 2:29:29 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats