LinkAce is a self-hosted archive to collect website links. In versions 2.3.0 and below, the htmlKeywordsFromUrl function in the FetchController class accepts user-provided URLs and makes HTTP requests to them without validating that the destination is not an internal or private network resource. This Server-Side Request Forgery (SSRF) vulnerability allows authenticated attackers to use the application server to perform port scanning and service discovery on internal networks. Practical impact is very limited because the function only extracts content from HTML meta keywords tags, which prevents meaningful data exfiltration from databases, APIs, or cloud metadata endpoints. This issue is fixed in version 2.4.0.
History

Wed, 05 Nov 2025 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 05 Nov 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Linkace
Linkace linkace
Vendors & Products Linkace
Linkace linkace

Tue, 04 Nov 2025 22:00:00 +0000

Type Values Removed Values Added
Description LinkAce is a self-hosted archive to collect website links. In versions 2.3.0 and below, the htmlKeywordsFromUrl function in the FetchController class accepts user-provided URLs and makes HTTP requests to them without validating that the destination is not an internal or private network resource. This Server-Side Request Forgery (SSRF) vulnerability allows authenticated attackers to use the application server to perform port scanning and service discovery on internal networks. Practical impact is very limited because the function only extracts content from HTML meta keywords tags, which prevents meaningful data exfiltration from databases, APIs, or cloud metadata endpoints. This issue is fixed in version 2.4.0.
Title LinkAce: Limited Server-Side Request Forgery (SSRF) in Keyword Fetching Functionality
Weaknesses CWE-918
References
Metrics cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-11-04T21:57:15.828Z

Updated: 2025-11-05T18:48:18.084Z

Reserved: 2025-10-20T19:41:22.741Z

Link: CVE-2025-62719

cve-icon Vulnrichment

Updated: 2025-11-05T14:19:12.818Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-04T22:16:38.787

Modified: 2025-11-06T19:45:30.990

Link: CVE-2025-62719

cve-icon Redhat

No data.