CVE-2025-62722

LinkAce is a self-hosted archive to collect website links. In versions 2.3.1 and below, the social media sharing functionality contains a Stored Cross-Site Scripting (XSS) vulnerability that allows any authenticated user to inject arbitrary JavaScript by creating a link with malicious HTML in the title field. When a user views the link details page and the shareable links are rendered, the malicious JavaScript executes in their browser. This vulnerability affects multiple sharing services and can be exploited to steal session cookies, perform actions on behalf of users, or deliver malware. This issue is fixed in version 2.4.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:linkace:linkace:*:*:*:*:*:*:*:*

History

25 Nov 2025, 18:45

Type Values Removed Values Added
First Time Linkace linkace
Linkace
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
References () https://github.com/Kovah/LinkAce/commit/95d29b71ad9d4750cff8bbe7488802f6a4afa6aa - () https://github.com/Kovah/LinkAce/commit/95d29b71ad9d4750cff8bbe7488802f6a4afa6aa - Patch
References () https://github.com/Kovah/LinkAce/releases/tag/v2.4.0 - () https://github.com/Kovah/LinkAce/releases/tag/v2.4.0 - Release Notes
References () https://github.com/Kovah/LinkAce/security/advisories/GHSA-4mxh-7c7f-q79j - () https://github.com/Kovah/LinkAce/security/advisories/GHSA-4mxh-7c7f-q79j - Exploit, Vendor Advisory
CPE cpe:2.3:a:linkace:linkace:*:*:*:*:*:*:*:*

05 Nov 2025, 19:16

Type Values Removed Values Added
References () https://github.com/Kovah/LinkAce/security/advisories/GHSA-4mxh-7c7f-q79j - () https://github.com/Kovah/LinkAce/security/advisories/GHSA-4mxh-7c7f-q79j -

04 Nov 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-04 23:15

Updated : 2025-11-25 18:45


NVD link : CVE-2025-62722

Mitre link : CVE-2025-62722

CVE.ORG link : CVE-2025-62722


JSON object : View

Products Affected

linkace

  • linkace
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')