CVE-2025-62720

6.5 MEDIUM

📋 TL;DR

This vulnerability in LinkAce allows any authenticated user to export the entire database of links, including private links belonging to other users. The export functions fail to apply proper access controls, enabling data exfiltration of sensitive information. All LinkAce instances running vulnerable versions with authenticated users are affected.

💻 Affected Systems

Products:
  • LinkAce
Versions: 2.3.1 and below
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Any LinkAce installation with authenticated users is vulnerable. The vulnerability exists in the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious authenticated user exfiltrates all private links from all users, potentially exposing sensitive personal or organizational data, leading to privacy violations and data breaches.

🟠

Likely Case

Authenticated user accesses and exports private links belonging to other users, violating privacy expectations and potentially exposing sensitive information.

🟢

If Mitigated

With proper access controls, users can only export their own links, maintaining data isolation and privacy as intended.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward via the export functionality. No special tools or advanced techniques are needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.0

Vendor Advisory: https://github.com/Kovah/LinkAce/security/advisories/GHSA-cqxv-6v28-2f2h

Restart Required: Yes

Instructions:

1. Backup your LinkAce database and configuration
2. Update LinkAce to version 2.4.0 or later
3. Restart the LinkAce service
4. Verify the fix by testing export functionality

🔧 Temporary Workarounds

Disable Export Functionality

all

Temporarily disable HTML and CSV export features to prevent exploitation while planning for patching.

Modify LinkAce configuration to disable export routes or restrict access via web server configuration

Restrict User Access

all

Limit authenticated user accounts to only trusted individuals and implement strict access controls.

Review and remove unnecessary user accounts
Implement strong authentication mechanisms

🧯 If You Can't Patch

  • Restrict export functionality to administrators only via web server configuration or application modifications
  • Implement network-level controls to limit access to export endpoints from untrusted users

🔍 How to Verify

Check if Vulnerable:

Check if authenticated users can export links via HTML or CSV export functions and see links belonging to other users.

Check Version:

Check LinkAce version in the admin interface or via the application's version file

Verify Fix Applied:

After updating to 2.4.0, verify that authenticated users can only export their own links and not those of other users.

📡 Detection & Monitoring

Log Indicators:

  • Unusual export activity from non-admin users
  • Multiple export requests from single user in short time
  • Export requests accessing large numbers of links

Network Indicators:

  • HTTP requests to export endpoints (/export) from authenticated users
  • Large data transfers via export functionality

SIEM Query:

source="linkace" AND (uri_path="/export" OR uri_path CONTAINS "export") AND user!="admin"

🔗 References

📤 Share & Export