CVE-2026-35516

LinkAce is a self-hosted archive to collect website links. Prior to 2.5.4, LinkRepository::update and CheckLinksCommand::checkLink do not check for private IPs. An authenticated user can read responses from internal services (AWS IMDSv1, cloud metadata, internal APIs) by creating a link with a public URL and then updating it to a private IP. The links:check cron job makes the request server-side without IP filtering. This can expose cloud credentials, internal service data, and network topology. This vulnerability is fixed in 2.5.4.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:linkace:linkace:*:*:*:*:*:*:*:*

History

14 Apr 2026, 20:27

Type Values Removed Values Added
CPE cpe:2.3:a:linkace:linkace:*:*:*:*:*:*:*:*
References () https://github.com/Kovah/LinkAce/security/advisories/GHSA-4jhm-r4f5-p7xm - () https://github.com/Kovah/LinkAce/security/advisories/GHSA-4jhm-r4f5-p7xm - Exploit, Mitigation, Vendor Advisory
First Time Linkace linkace
Linkace

09 Apr 2026, 15:16

Type Values Removed Values Added
References () https://github.com/Kovah/LinkAce/security/advisories/GHSA-4jhm-r4f5-p7xm - () https://github.com/Kovah/LinkAce/security/advisories/GHSA-4jhm-r4f5-p7xm -

07 Apr 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-07 16:16

Updated : 2026-04-14 20:27


NVD link : CVE-2026-35516

Mitre link : CVE-2026-35516

CVE.ORG link : CVE-2026-35516


JSON object : View

Products Affected

linkace

  • linkace
CWE
CWE-918

Server-Side Request Forgery (SSRF)