Linkr is a lightweight file delivery system that downloads files from a webserver. Linkr versions through 2.0.0 do not verify the integrity or authenticity of .linkr manifest files before using their contents, allowing a tampered manifest to inject arbitrary file entries into a package distribution. An attacker can modify a generated .linkr manifest (for example by adding a new entry with a malicious URL) and when a user runs the extract command the client downloads the attacker-supplied file without verification. This enables arbitrary file injection and creates a potential path to remote code execution if a downloaded malicious binary or script is later executed. Version 2.0.1 adds a manifest integrity check that compares the checksum of the original author-created manifest to the one being extracted and aborts on mismatch, warning if no original manifest is hosted. Users should update to 2.0.1 or later. As a workaround prior to updating, use only trusted .linkr manifests, manually verify manifest integrity, and host manifests on trusted servers.
References
Configurations
No configuration.
History
16 Sep 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/mohammadzain2008/Linkr/security/advisories/GHSA-6wph-mpv2-29xv - |
16 Sep 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-16 17:15
Updated : 2025-09-17 14:18
NVD link : CVE-2025-59334
Mitre link : CVE-2025-59334
CVE.ORG link : CVE-2025-59334
JSON object : View
Products Affected
No product.
CWE
CWE-347
Improper Verification of Cryptographic Signature