CVE Tools
Home/Vulnerability/CVE-2026-39963

CVE-2026-39963

Serendipity: Host Header Injection enables authentication cookie scoping to an attacker-controlled domain

Published: Apr 14, 2026Updated: Apr 15, 2026 Sources: CVE List NVD
6.9CVSS
MEDIUM

Serendipity is a PHP-powered weblog engine. In versions 2.6-beta2 and below, the serendipity_setCookie() function in include/functions_config.inc.php uses $_SERVER['HTTP_HOST'] without validation as the domain parameter of setcookie(). An attacker who can influence the Host header at login time, such as via MITM, reverse proxy misconfiguration, or load balancer manipulation, can force authentication cookies including session tokens and auto-login tokens to be scoped to an attacker-controlled domain. This enables session fixation, token leakage to attacker-controlled infrastructure, and privilege escalation if an admin logs in under a poisoned Host header. This issue has been fixed in version 2.6.0.

EPSS Score
0.0%
Top 87.1%
CISA KEV
Not in KEV
Exploits
No Known Exploits
Remediation
No Fix Available

CVSS Vector Breakdown

AV:NAC:HPR:NUI:RS:CC:HI:LA:N
Exploitability
AV:NAttack Vector
Network
AC:HAttack Complexity
High
PR:NPrivileges Required
None
UI:RUser Interaction
Required
Scope
S:CScope
Changed
Impact
C:HConfidentiality
High
I:LIntegrity
Low
A:NAvailability
None

Weaknesses

Affected Products

Serendipity
s9y

Exploitability

No known exploits, KEV entries, or remediation guidance available for this vulnerability yet.

References

Timeline

Published
Apr 14, 2026
Last Updated
Apr 15, 2026

Unlock Complete Vulnerability Intelligence

Get the full picture for CVE-2026-39963 and every CVE in our database. Create a free account — no credit card required.

Create Free Account
AI-powered analysis
Plain-language impact assessment and exploitation scenario
Attack graph visualization
Interactive attack path and kill chain mapping
Exploit details & PoC links
ExploitDB, Metasploit, GitHub PoCs with direct links
Nuclei scanner templates
Ready-to-use vulnerability scanner templates
Full remediation guide
Patch instructions, workarounds, and compliance impact
Interactive AI chat
Ask questions about this vulnerability in natural language
Related vulnerabilities
Semantically similar CVEs and attack patterns
REST API & MCP access
Integrate vulnerability data into your workflows