CVE-2023-6646: CWE-79 Cross Site Scripting in linkding
A vulnerability classified as problematic has been found in linkding 1.23.0. Affected is an unknown function. The manipulation of the argument q leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.23.1 is able to address this issue. It is recommended to upgrade the affected component. VDB-247338 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early, responded in a very professional manner and immediately released a fixed version of the affected product.
AI Analysis
Technical Summary
CVE-2023-6646 is a cross-site scripting (XSS) vulnerability identified in linkding version 1.23.0, a web-based bookmarking service. The vulnerability arises from improper sanitization of the 'q' parameter, which can be manipulated by an attacker to inject malicious scripts. This flaw allows remote attackers to execute arbitrary JavaScript in the context of the victim's browser when they interact with a crafted link or input. The vulnerability is classified under CWE-79, indicating it is a classic reflected XSS issue. Exploitation requires the victim to perform some user interaction, such as clicking a malicious link or visiting a specially crafted page. The vulnerability does not require elevated privileges but does require user interaction, and it impacts the integrity of the application by potentially allowing script injection, though it does not affect confidentiality or availability directly. The vendor responded promptly and released version 1.23.1 to address this issue. The CVSS 3.1 base score is 3.5, reflecting a low severity due to the limited impact and exploitation conditions. No known exploits are currently reported in the wild. This vulnerability highlights the importance of input validation and output encoding in web applications to prevent injection attacks that can compromise user trust and session integrity.
Potential Impact
For European organizations using linkding 1.23.0, this vulnerability could lead to targeted phishing or session hijacking attacks via malicious script execution in users' browsers. While the direct impact on confidentiality and availability is minimal, the integrity of user interactions and data displayed by the application can be compromised. This could result in unauthorized actions performed on behalf of users or the theft of session tokens if combined with other vulnerabilities. Organizations relying on linkding for internal or external bookmark management may face reputational damage or operational disruptions if attackers exploit this flaw to deliver malware or redirect users to malicious sites. The risk is heightened in environments where users have elevated privileges or access sensitive information through the application. However, since exploitation requires user interaction and the vulnerability is patched in version 1.23.1, timely updates can effectively mitigate the risk.
Mitigation Recommendations
European organizations should immediately upgrade linkding installations from version 1.23.0 to 1.23.1 or later to remediate the vulnerability. In addition to patching, organizations should implement strict input validation and output encoding practices to prevent XSS in all web applications. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Conduct user awareness training to recognize phishing attempts that may leverage this vulnerability. Regularly audit and monitor web application logs for suspicious activities related to the 'q' parameter or unusual user interactions. If upgrading is delayed, consider deploying web application firewalls (WAFs) with rules to detect and block XSS payloads targeting the vulnerable parameter. Finally, integrate automated security testing in the development lifecycle to catch similar issues early.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2023-6646: CWE-79 Cross Site Scripting in linkding
Description
A vulnerability classified as problematic has been found in linkding 1.23.0. Affected is an unknown function. The manipulation of the argument q leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.23.1 is able to address this issue. It is recommended to upgrade the affected component. VDB-247338 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early, responded in a very professional manner and immediately released a fixed version of the affected product.
AI-Powered Analysis
Technical Analysis
CVE-2023-6646 is a cross-site scripting (XSS) vulnerability identified in linkding version 1.23.0, a web-based bookmarking service. The vulnerability arises from improper sanitization of the 'q' parameter, which can be manipulated by an attacker to inject malicious scripts. This flaw allows remote attackers to execute arbitrary JavaScript in the context of the victim's browser when they interact with a crafted link or input. The vulnerability is classified under CWE-79, indicating it is a classic reflected XSS issue. Exploitation requires the victim to perform some user interaction, such as clicking a malicious link or visiting a specially crafted page. The vulnerability does not require elevated privileges but does require user interaction, and it impacts the integrity of the application by potentially allowing script injection, though it does not affect confidentiality or availability directly. The vendor responded promptly and released version 1.23.1 to address this issue. The CVSS 3.1 base score is 3.5, reflecting a low severity due to the limited impact and exploitation conditions. No known exploits are currently reported in the wild. This vulnerability highlights the importance of input validation and output encoding in web applications to prevent injection attacks that can compromise user trust and session integrity.
Potential Impact
For European organizations using linkding 1.23.0, this vulnerability could lead to targeted phishing or session hijacking attacks via malicious script execution in users' browsers. While the direct impact on confidentiality and availability is minimal, the integrity of user interactions and data displayed by the application can be compromised. This could result in unauthorized actions performed on behalf of users or the theft of session tokens if combined with other vulnerabilities. Organizations relying on linkding for internal or external bookmark management may face reputational damage or operational disruptions if attackers exploit this flaw to deliver malware or redirect users to malicious sites. The risk is heightened in environments where users have elevated privileges or access sensitive information through the application. However, since exploitation requires user interaction and the vulnerability is patched in version 1.23.1, timely updates can effectively mitigate the risk.
Mitigation Recommendations
European organizations should immediately upgrade linkding installations from version 1.23.0 to 1.23.1 or later to remediate the vulnerability. In addition to patching, organizations should implement strict input validation and output encoding practices to prevent XSS in all web applications. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Conduct user awareness training to recognize phishing attempts that may leverage this vulnerability. Regularly audit and monitor web application logs for suspicious activities related to the 'q' parameter or unusual user interactions. If upgrading is delayed, consider deploying web application firewalls (WAFs) with rules to detect and block XSS payloads targeting the vulnerable parameter. Finally, integrate automated security testing in the development lifecycle to catch similar issues early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2023-12-09T08:13:36.716Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6835da20182aa0cae217e5a7
Added to database: 5/27/2025, 3:28:32 PM
Last enriched: 7/6/2025, 3:56:46 AM
Last updated: 8/17/2025, 5:30:05 PM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.