Home

Description

LinkAce is a self-hosted archive to collect website links. A stored cross-site scripting (XSS) vulnerability was discovered in versions prior to 2.1.9 that allows an attacker to inject arbitrary JavaScript, which is then executed in the context of a user's browser when the malicious link is clicked. This is a one-click XSS, meaning the victim only needs to click a crafted link — no further interaction is required. The application contains a stored XSS vulnerability due to insufficient filtering and escaping of user-supplied data inserted into link attributes. Malicious JavaScript code can be saved in the database along with the link and executed in the user’s browser when clicking the link, leading to arbitrary script execution within the context of the site. Version 2.1.9 fixes the issue.

PUBLISHED Reserved 2025-07-09 | Published 2025-09-08 | Updated 2025-09-08 | Assigner GitHub_M




HIGH: 8.4CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 2.1.9
affected

References

github.com/...inkAce/security/advisories/GHSA-vwmx-v9qf-q656

github.com/...ommit/4da467a4b0fbb1650670e603f4449b8a47695631

cve.org (CVE-2025-53838)

nvd.nist.gov (CVE-2025-53838)

Download JSON