Cyber Posture

CVE-2026-27812

Critical

Published: 26 February 2026

Published
26 February 2026
Modified
05 March 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0005 16.0th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-27812 is a critical-severity Improper Encoding or Escaping of Output (CWE-116) vulnerability in Sub2Api Sub2Api. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 16.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

This vulnerability is AI-related — categorised as Other AI Platforms; in the Adversarial Attacks risk domain.

The strongest mitigations our analysis identified are NIST 800-53 CM-7 (Least Functionality) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Validates untrusted inputs such as Host and Forwarded headers to prevent attackers from injecting malicious domains into password reset links.

prevent

Ensures timely identification, reporting, and patching of the specific flaw fixed in Sub2API v0.1.85.

prevent

Implements least functionality by disabling the forgot password feature to block exploitation of the vulnerable endpoint.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

CVE describes remote unauthenticated exploitation of a public-facing API endpoint (password reset) via header injection, directly matching T1190 for initial access; successful exploitation results in account takeover, directly enabling T1078 Valid Accounts abuse.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Sub2API is an AI API gateway platform designed to distribute and manage API quotas from AI product subscriptions. A vulnerability in versions prior to 0.1.85 is a Password Reset Poisoning (Host Header / Forwarded Header trust issue), which allows attackers…

more

to manipulate the password reset link. Attackers can exploit this flaw to inject their own domain into the password reset link, leading to the potential for account takeover. The vulnerability has been fixed in version v0.1.85. If upgrading is not immediately possible, users can mitigate the vulnerability by disabling the "forgot password" feature until an upgrade to a patched version can be performed. This will prevent attackers from exploiting the vulnerability via the affected endpoint.

Deeper analysisAI

CVE-2026-27812 is a Password Reset Poisoning vulnerability stemming from a Host Header and Forwarded Header trust issue in Sub2API, an AI API gateway platform designed to distribute and manage API quotas from AI product subscriptions. The flaw affects versions prior to 0.1.85 and has a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), linked to CWE-116 (Improper Encoding or Escaping of Output). It enables attackers to manipulate password reset links by injecting malicious domains.

Any remote attacker without privileges or user interaction can exploit this vulnerability over the network with low complexity. By targeting the affected endpoint, they can alter the password reset URL to point to a domain they control, potentially leading to full account takeover by intercepting and abusing the reset process.

The vulnerability is fixed in Sub2API version v0.1.85. If immediate upgrading is not feasible, the advisory recommends disabling the "forgot password" feature to block exploitation via the affected endpoint. Additional details are available in the GitHub Security Advisory at https://github.com/Wei-Shaw/sub2api/security/advisories/GHSA-vc2q-289v-74g3.

Details

CWE(s)

Affected Products

sub2api
sub2api
≤ 0.1.85

AI Security AnalysisAI

AI Category
Other AI Platforms
Risk Domain
Adversarial Attacks
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Matched keywords: ai, ai

CVEs Like This One

CVE-2026-34483Shared CWE-116
CVE-2025-55730Shared CWE-116
CVE-2024-10441Shared CWE-116
CVE-2025-55729Shared CWE-116
CVE-2026-24737Shared CWE-116
CVE-2026-31898Shared CWE-116
CVE-2026-22792Shared CWE-116
CVE-2026-25940Shared CWE-116
CVE-2026-33597Shared CWE-116
CVE-2026-33301Shared CWE-116

References