Skip to main content

CVE-2025-59334: CWE-347: Improper Verification of Cryptographic Signature in mohammadzain2008 Linkr

Critical
VulnerabilityCVE-2025-59334cvecve-2025-59334cwe-347
Published: Tue Sep 16 2025 (09/16/2025, 16:48:34 UTC)
Source: CVE Database V5
Vendor/Project: mohammadzain2008
Product: Linkr

Description

Linkr is a lightweight file delivery system that downloads files from a webserver. Linkr versions through 2.0.0 do not verify the integrity or authenticity of .linkr manifest files before using their contents, allowing a tampered manifest to inject arbitrary file entries into a package distribution. An attacker can modify a generated .linkr manifest (for example by adding a new entry with a malicious URL) and when a user runs the extract command the client downloads the attacker-supplied file without verification. This enables arbitrary file injection and creates a potential path to remote code execution if a downloaded malicious binary or script is later executed. Version 2.0.1 adds a manifest integrity check that compares the checksum of the original author-created manifest to the one being extracted and aborts on mismatch, warning if no original manifest is hosted. Users should update to 2.0.1 or later. As a workaround prior to updating, use only trusted .linkr manifests, manually verify manifest integrity, and host manifests on trusted servers.

AI-Powered Analysis

AILast updated: 09/16/2025, 16:54:19 UTC

Technical Analysis

CVE-2025-59334 is a critical vulnerability affecting Linkr, a lightweight file delivery system developed by mohammadzain2008. Linkr versions prior to 2.0.1 do not verify the integrity or authenticity of .linkr manifest files before processing them. These manifest files dictate which files are downloaded and extracted by the client. Due to improper verification of cryptographic signatures (CWE-347), an attacker can tamper with a .linkr manifest by injecting arbitrary file entries, such as malicious URLs pointing to attacker-controlled payloads. When a user runs the extract command, the client blindly downloads and extracts these malicious files without validation. This flaw enables arbitrary file injection and can lead to remote code execution if the malicious files are executed later. The vulnerability is exploitable remotely without authentication and requires only user interaction to trigger extraction. Linkr version 2.0.1 mitigates this by adding a manifest integrity check that compares the checksum of the original author-created manifest with the one being extracted, aborting the process on mismatch and warning if no original manifest is hosted. Until users upgrade, they must rely on trusted manifests, manual verification, and hosting manifests on trusted servers. The CVSS v3.1 score of 9.7 reflects the critical nature of this vulnerability, with network attack vector, low attack complexity, no privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability. No known exploits are reported in the wild yet, but the potential for remote code execution makes this a severe threat.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to those using Linkr for file distribution or software deployment. Successful exploitation can lead to arbitrary code execution, potentially allowing attackers to install malware, steal sensitive data, or disrupt operations. This can compromise confidentiality, integrity, and availability of critical systems. Sectors such as finance, healthcare, government, and critical infrastructure that rely on secure file delivery are particularly at risk. The ability to inject malicious files remotely without authentication increases the attack surface and likelihood of exploitation. Additionally, supply chain attacks leveraging tampered manifests could propagate malware widely within organizations. The impact extends to reputational damage, regulatory non-compliance (e.g., GDPR), and financial losses due to incident response and remediation. The requirement for user interaction (extract command) means social engineering or phishing could be used to trick users into triggering the exploit, further increasing risk.

Mitigation Recommendations

1. Immediate upgrade to Linkr version 2.0.1 or later, which includes manifest integrity verification, is the most effective mitigation. 2. Until upgrading, restrict usage of Linkr manifests to those obtained from trusted sources only. 3. Implement manual verification of manifest checksums before extraction to detect tampering. 4. Host manifests exclusively on secure, trusted servers with strong access controls and monitoring to prevent unauthorized modifications. 5. Educate users about the risks of extracting files from untrusted manifests and train them to recognize suspicious files or URLs. 6. Employ network security controls such as web filtering and intrusion detection to block access to known malicious URLs. 7. Monitor Linkr usage logs for unusual manifest downloads or extraction activities. 8. Consider application whitelisting or endpoint protection solutions to prevent execution of unauthorized binaries or scripts downloaded via Linkr. 9. Integrate manifest verification into automated deployment pipelines to enforce integrity checks before file extraction.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-12T12:36:24.635Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c995a8cb0fe83b58201ab9

Added to database: 9/16/2025, 4:51:52 PM

Last enriched: 9/16/2025, 4:54:19 PM

Last updated: 9/17/2025, 7:02:06 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats