LinkAce is a self-hosted archive to collect website links. Versions prior to 2.5.3 block direct requests to private IP literals, but still performs server-side requests to internal-only resources when those resources are referenced through an internal hostname. This allows an authenticated user to trigger server-side requests to internal services reachable by the LinkAce server but not directly reachable by an external user. Version 2.5.3 patches the issue.
References
| Link | Resource |
|---|---|
| https://github.com/Kovah/LinkAce/security/advisories/GHSA-wp4g-qw9j-wfjg | Exploit Vendor Advisory |
Configurations
History
31 Mar 2026, 17:57
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Kovah/LinkAce/security/advisories/GHSA-wp4g-qw9j-wfjg - Exploit, Vendor Advisory | |
| First Time |
Linkace linkace
Linkace |
|
| CPE | cpe:2.3:a:linkace:linkace:*:*:*:*:*:*:*:* |
27 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-27 22:16
Updated : 2026-03-31 17:57
NVD link : CVE-2026-33953
Mitre link : CVE-2026-33953
CVE.ORG link : CVE-2026-33953
JSON object : View
Products Affected
linkace
- linkace
CWE
CWE-918
Server-Side Request Forgery (SSRF)
