Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32616: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in kasuganosoras Pigeon

0
High
VulnerabilityCVE-2026-32616cvecve-2026-32616cwe-74
Published: Fri Mar 13 2026 (03/13/2026, 21:12:40 UTC)
Source: CVE Database V5
Vendor/Project: kasuganosoras
Product: Pigeon

Description

Pigeon is a message board/notepad/social system/blog. Prior to 1.0.201, the application uses $_SERVER['HTTP_HOST'] without validation to construct email verification URLs in the register and resendmail flows. An attacker can manipulate the Host header in the HTTP request, causing the verification link sent to the user's email to point to an attacker-controlled domain. This can lead to account takeover by stealing the email verification token. This vulnerability is fixed in 1.0.201.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 23:25:45 UTC

Technical Analysis

CVE-2026-32616 is an injection vulnerability classified under CWE-74, affecting kasuganosoras Pigeon, a message board, notepad, social system, and blog platform. Prior to version 1.0.201, Pigeon uses the HTTP Host header ($_SERVER['HTTP_HOST']) directly and without validation to construct email verification URLs during user registration and resendmail workflows. Because the Host header is attacker-controllable, an adversary can send HTTP requests with a manipulated Host header, causing the system to generate verification links that point to domains controlled by the attacker. When these malicious links are sent to users via email, clicking them can expose the email verification token to the attacker. This token exposure enables account takeover by allowing the attacker to verify accounts or reset credentials. The vulnerability impacts confidentiality (exposure of tokens) and integrity (account compromise) but does not affect availability. Exploitation requires no privileges or authentication but does require user interaction to click the malicious link. The vulnerability is fixed in version 1.0.201 by properly validating or sanitizing the Host header before use in URL generation. No known exploits are currently in the wild, but the high CVSS score (8.2) reflects the serious risk posed by this flaw.

Potential Impact

The primary impact of CVE-2026-32616 is the potential for account takeover through theft of email verification tokens. Organizations using vulnerable versions of Pigeon risk unauthorized access to user accounts, which can lead to data breaches, impersonation, and further exploitation within the system. Confidentiality is compromised as attackers can intercept sensitive tokens. Integrity is affected because attackers can manipulate account states by verifying or resetting accounts fraudulently. Although availability is not directly impacted, the reputational damage and potential regulatory consequences of compromised user accounts can be significant. This vulnerability is particularly dangerous for organizations relying on Pigeon for user authentication and communication, especially those with sensitive or critical user data. The ease of exploitation (no authentication required) and the widespread use of HTTP Host headers in web applications increase the risk of exploitation if patches are not applied promptly.

Mitigation Recommendations

1. Upgrade Pigeon to version 1.0.201 or later immediately to apply the official fix that validates the HTTP Host header before use in email verification URLs. 2. Implement strict validation and sanitization of all HTTP headers, especially Host headers, to ensure they conform to expected domain names or whitelist approved domains. 3. Use absolute URLs with hardcoded or securely configured domain names for email verification links instead of relying on user-controllable headers. 4. Monitor outgoing email verification links for anomalies or unexpected domains to detect potential exploitation attempts. 5. Educate users to be cautious about clicking email links and verify the domain before interacting. 6. Employ multi-factor authentication to reduce the impact of account takeover even if tokens are compromised. 7. Conduct regular security audits and penetration testing focusing on header injection and token handling mechanisms. 8. Implement logging and alerting for unusual registration or email resend activities that may indicate exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-12T14:54:24.271Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b481d42f860ef943b5ebb9

Added to database: 3/13/2026, 9:29:56 PM

Last enriched: 3/20/2026, 11:25:45 PM

Last updated: 4/30/2026, 12:37:33 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses