Skip to main content

CVE-2023-6646: CWE-79 Cross Site Scripting in linkding

Low
VulnerabilityCVE-2023-6646cvecve-2023-6646cwe-79
Published: Sat Dec 09 2023 (12/09/2023, 21:31:03 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: linkding

Description

A vulnerability classified as problematic has been found in linkding 1.23.0. Affected is an unknown function. The manipulation of the argument q leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.23.1 is able to address this issue. It is recommended to upgrade the affected component. VDB-247338 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early, responded in a very professional manner and immediately released a fixed version of the affected product.

AI-Powered Analysis

AILast updated: 07/06/2025, 03:56:46 UTC

Technical Analysis

CVE-2023-6646 is a cross-site scripting (XSS) vulnerability identified in linkding version 1.23.0, a web-based bookmarking service. The vulnerability arises from improper sanitization of the 'q' parameter, which can be manipulated by an attacker to inject malicious scripts. This flaw allows remote attackers to execute arbitrary JavaScript in the context of the victim's browser when they interact with a crafted link or input. The vulnerability is classified under CWE-79, indicating it is a classic reflected XSS issue. Exploitation requires the victim to perform some user interaction, such as clicking a malicious link or visiting a specially crafted page. The vulnerability does not require elevated privileges but does require user interaction, and it impacts the integrity of the application by potentially allowing script injection, though it does not affect confidentiality or availability directly. The vendor responded promptly and released version 1.23.1 to address this issue. The CVSS 3.1 base score is 3.5, reflecting a low severity due to the limited impact and exploitation conditions. No known exploits are currently reported in the wild. This vulnerability highlights the importance of input validation and output encoding in web applications to prevent injection attacks that can compromise user trust and session integrity.

Potential Impact

For European organizations using linkding 1.23.0, this vulnerability could lead to targeted phishing or session hijacking attacks via malicious script execution in users' browsers. While the direct impact on confidentiality and availability is minimal, the integrity of user interactions and data displayed by the application can be compromised. This could result in unauthorized actions performed on behalf of users or the theft of session tokens if combined with other vulnerabilities. Organizations relying on linkding for internal or external bookmark management may face reputational damage or operational disruptions if attackers exploit this flaw to deliver malware or redirect users to malicious sites. The risk is heightened in environments where users have elevated privileges or access sensitive information through the application. However, since exploitation requires user interaction and the vulnerability is patched in version 1.23.1, timely updates can effectively mitigate the risk.

Mitigation Recommendations

European organizations should immediately upgrade linkding installations from version 1.23.0 to 1.23.1 or later to remediate the vulnerability. In addition to patching, organizations should implement strict input validation and output encoding practices to prevent XSS in all web applications. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Conduct user awareness training to recognize phishing attempts that may leverage this vulnerability. Regularly audit and monitor web application logs for suspicious activities related to the 'q' parameter or unusual user interactions. If upgrading is delayed, consider deploying web application firewalls (WAFs) with rules to detect and block XSS payloads targeting the vulnerable parameter. Finally, integrate automated security testing in the development lifecycle to catch similar issues early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2023-12-09T08:13:36.716Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6835da20182aa0cae217e5a7

Added to database: 5/27/2025, 3:28:32 PM

Last enriched: 7/6/2025, 3:56:46 AM

Last updated: 8/17/2025, 5:30:05 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats