No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 16 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kasuganosoras
Kasuganosoras pigeon |
|
| Vendors & Products |
Kasuganosoras
Kasuganosoras pigeon |
Fri, 13 Mar 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Pigeon is a message board/notepad/social system/blog. Prior to 1.0.201, the application uses $_SERVER['HTTP_HOST'] without validation to construct email verification URLs in the register and resendmail flows. An attacker can manipulate the Host header in the HTTP request, causing the verification link sent to the user's email to point to an attacker-controlled domain. This can lead to account takeover by stealing the email verification token. This vulnerability is fixed in 1.0.201. | |
| Title | Pigeon has a Host Header Injection in email verification flow | |
| Weaknesses | CWE-74 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-16T16:46:32.353Z
Reserved: 2026-03-12T14:54:24.271Z
Link: CVE-2026-32616
Updated: 2026-03-16T16:46:29.485Z
Status : Awaiting Analysis
Published: 2026-03-16T14:19:39.393
Modified: 2026-03-16T14:53:07.390
Link: CVE-2026-32616
No data.
OpenCVE Enrichment
Updated: 2026-03-16T09:22:47Z