Ghostwire

CVE-2026-37504: Sensitive server_token exposed via GET parameter in V2Board thru 1.7.4. In...

MEDIUM CVSS 5.5 EPSS 0.04%

Published: May 1, 2026 | Last Modified: May 1, 2026

Description

Sensitive server_token exposed via GET parameter in V2Board thru 1.7.4. In app/Http/Controllers/Server/UniProxyController.php, the server authentication token is accepted via GET parameter transmission. The token appears in URLs such as /api/v1/server/UniProxy/user?token=SECRET, causing it to be recorded in web server access logs, browser history, HTTP Referer headers, and proxy/CDN logs. An attacker who gains access to any log source can extract the token and impersonate a proxy server node, potentially intercepting all user traffic.

Ghostwire Analysis — What This Means Practically

Exploitation Probability (EPSS): Low — 0.04% (11th percentile)

Low exploitation probability based on current threat landscape data. Standard patching timeline is appropriate.

This analysis is generated by Ghostwire from NVD, CISA KEV, EPSS, and open-source intelligence data. Verify findings through primary sources before acting.

Security Coverage (2 articles)

References