CVE-2026-32616: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in kasuganosoras Pigeon
Pigeon is a message board/notepad/social system/blog. Prior to 1.0.201, the application uses $_SERVER['HTTP_HOST'] without validation to construct email verification URLs in the register and resendmail flows. An attacker can manipulate the Host header in the HTTP request, causing the verification link sent to the user's email to point to an attacker-controlled domain. This can lead to account takeover by stealing the email verification token. This vulnerability is fixed in 1.0.201.
AI Analysis
Technical Summary
CVE-2026-32616 is an injection vulnerability classified under CWE-74, affecting kasuganosoras Pigeon, a message board, notepad, social system, and blog platform. Prior to version 1.0.201, Pigeon uses the HTTP Host header ($_SERVER['HTTP_HOST']) directly and without validation to construct email verification URLs during user registration and resendmail workflows. Because the Host header is attacker-controllable, an adversary can send HTTP requests with a manipulated Host header, causing the system to generate verification links that point to domains controlled by the attacker. When these malicious links are sent to users via email, clicking them can expose the email verification token to the attacker. This token exposure enables account takeover by allowing the attacker to verify accounts or reset credentials. The vulnerability impacts confidentiality (exposure of tokens) and integrity (account compromise) but does not affect availability. Exploitation requires no privileges or authentication but does require user interaction to click the malicious link. The vulnerability is fixed in version 1.0.201 by properly validating or sanitizing the Host header before use in URL generation. No known exploits are currently in the wild, but the high CVSS score (8.2) reflects the serious risk posed by this flaw.
Potential Impact
The primary impact of CVE-2026-32616 is the potential for account takeover through theft of email verification tokens. Organizations using vulnerable versions of Pigeon risk unauthorized access to user accounts, which can lead to data breaches, impersonation, and further exploitation within the system. Confidentiality is compromised as attackers can intercept sensitive tokens. Integrity is affected because attackers can manipulate account states by verifying or resetting accounts fraudulently. Although availability is not directly impacted, the reputational damage and potential regulatory consequences of compromised user accounts can be significant. This vulnerability is particularly dangerous for organizations relying on Pigeon for user authentication and communication, especially those with sensitive or critical user data. The ease of exploitation (no authentication required) and the widespread use of HTTP Host headers in web applications increase the risk of exploitation if patches are not applied promptly.
Mitigation Recommendations
1. Upgrade Pigeon to version 1.0.201 or later immediately to apply the official fix that validates the HTTP Host header before use in email verification URLs. 2. Implement strict validation and sanitization of all HTTP headers, especially Host headers, to ensure they conform to expected domain names or whitelist approved domains. 3. Use absolute URLs with hardcoded or securely configured domain names for email verification links instead of relying on user-controllable headers. 4. Monitor outgoing email verification links for anomalies or unexpected domains to detect potential exploitation attempts. 5. Educate users to be cautious about clicking email links and verify the domain before interacting. 6. Employ multi-factor authentication to reduce the impact of account takeover even if tokens are compromised. 7. Conduct regular security audits and penetration testing focusing on header injection and token handling mechanisms. 8. Implement logging and alerting for unusual registration or email resend activities that may indicate exploitation attempts.
Affected Countries
United States, Japan, Germany, United Kingdom, Canada, Australia, France, South Korea, Netherlands, Singapore
CVE-2026-32616: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in kasuganosoras Pigeon
Description
Pigeon is a message board/notepad/social system/blog. Prior to 1.0.201, the application uses $_SERVER['HTTP_HOST'] without validation to construct email verification URLs in the register and resendmail flows. An attacker can manipulate the Host header in the HTTP request, causing the verification link sent to the user's email to point to an attacker-controlled domain. This can lead to account takeover by stealing the email verification token. This vulnerability is fixed in 1.0.201.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-32616 is an injection vulnerability classified under CWE-74, affecting kasuganosoras Pigeon, a message board, notepad, social system, and blog platform. Prior to version 1.0.201, Pigeon uses the HTTP Host header ($_SERVER['HTTP_HOST']) directly and without validation to construct email verification URLs during user registration and resendmail workflows. Because the Host header is attacker-controllable, an adversary can send HTTP requests with a manipulated Host header, causing the system to generate verification links that point to domains controlled by the attacker. When these malicious links are sent to users via email, clicking them can expose the email verification token to the attacker. This token exposure enables account takeover by allowing the attacker to verify accounts or reset credentials. The vulnerability impacts confidentiality (exposure of tokens) and integrity (account compromise) but does not affect availability. Exploitation requires no privileges or authentication but does require user interaction to click the malicious link. The vulnerability is fixed in version 1.0.201 by properly validating or sanitizing the Host header before use in URL generation. No known exploits are currently in the wild, but the high CVSS score (8.2) reflects the serious risk posed by this flaw.
Potential Impact
The primary impact of CVE-2026-32616 is the potential for account takeover through theft of email verification tokens. Organizations using vulnerable versions of Pigeon risk unauthorized access to user accounts, which can lead to data breaches, impersonation, and further exploitation within the system. Confidentiality is compromised as attackers can intercept sensitive tokens. Integrity is affected because attackers can manipulate account states by verifying or resetting accounts fraudulently. Although availability is not directly impacted, the reputational damage and potential regulatory consequences of compromised user accounts can be significant. This vulnerability is particularly dangerous for organizations relying on Pigeon for user authentication and communication, especially those with sensitive or critical user data. The ease of exploitation (no authentication required) and the widespread use of HTTP Host headers in web applications increase the risk of exploitation if patches are not applied promptly.
Mitigation Recommendations
1. Upgrade Pigeon to version 1.0.201 or later immediately to apply the official fix that validates the HTTP Host header before use in email verification URLs. 2. Implement strict validation and sanitization of all HTTP headers, especially Host headers, to ensure they conform to expected domain names or whitelist approved domains. 3. Use absolute URLs with hardcoded or securely configured domain names for email verification links instead of relying on user-controllable headers. 4. Monitor outgoing email verification links for anomalies or unexpected domains to detect potential exploitation attempts. 5. Educate users to be cautious about clicking email links and verify the domain before interacting. 6. Employ multi-factor authentication to reduce the impact of account takeover even if tokens are compromised. 7. Conduct regular security audits and penetration testing focusing on header injection and token handling mechanisms. 8. Implement logging and alerting for unusual registration or email resend activities that may indicate exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-12T14:54:24.271Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b481d42f860ef943b5ebb9
Added to database: 3/13/2026, 9:29:56 PM
Last enriched: 3/20/2026, 11:25:45 PM
Last updated: 4/30/2026, 12:37:33 AM
Views: 61
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.