CVE-2025-62719: CWE-918: Server-Side Request Forgery (SSRF) in Kovah LinkAce
LinkAce is a self-hosted archive to collect website links. In versions 2.3.0 and below, the htmlKeywordsFromUrl function in the FetchController class accepts user-provided URLs and makes HTTP requests to them without validating that the destination is not an internal or private network resource. This Server-Side Request Forgery (SSRF) vulnerability allows authenticated attackers to use the application server to perform port scanning and service discovery on internal networks. Practical impact is very limited because the function only extracts content from HTML meta keywords tags, which prevents meaningful data exfiltration from databases, APIs, or cloud metadata endpoints. This issue is fixed in version 2.4.0.
AI Analysis
Technical Summary
CVE-2025-62719 is a Server-Side Request Forgery (SSRF) vulnerability identified in Kovah's LinkAce, a self-hosted link archiving application. The vulnerability exists in versions 2.3.0 and earlier within the htmlKeywordsFromUrl function of the FetchController class. This function accepts URLs provided by authenticated users and performs HTTP requests to these URLs without validating whether the target is an internal or private network resource. Consequently, an attacker with valid credentials can leverage the application server to conduct port scanning and service discovery on internal network hosts that would otherwise be inaccessible externally. Despite this, the potential for data exfiltration is minimal because the function only extracts content from HTML meta keywords tags, which limits the ability to retrieve sensitive data from databases, APIs, or cloud metadata endpoints. The vulnerability does not require user interaction beyond authentication and has a low attack complexity. The CVSS 4.0 base score is 2.3, reflecting low severity due to limited impact and the requirement for authenticated access. No known exploits have been reported in the wild. The vulnerability was published on November 4, 2025, and has been addressed in LinkAce version 2.4.0, which includes proper validation to prevent SSRF attacks by restricting requests to internal or private network resources.
Potential Impact
For European organizations using LinkAce versions 2.3.0 or earlier, this SSRF vulnerability could allow authenticated users to perform reconnaissance on internal network infrastructure by scanning ports and discovering services. While the direct risk of data theft or system compromise is low due to the limited data extraction capability, the information gathered through port scanning could aid attackers in planning further attacks. This is particularly relevant for organizations with sensitive internal networks or segmented environments where external access is restricted. The vulnerability could also be leveraged in multi-tenant or shared hosting environments to map internal resources. However, since exploitation requires authentication, the threat is mitigated by strong access controls. The limited severity and absence of known exploits reduce immediate risk, but organizations should not ignore the potential for internal reconnaissance that could facilitate more serious attacks.
Mitigation Recommendations
European organizations should upgrade LinkAce installations to version 2.4.0 or later, where the SSRF vulnerability is fixed by validating and restricting URLs to prevent requests to internal or private network addresses. Until upgrading is possible, organizations should enforce strict authentication and authorization policies to limit access to trusted users only. Network segmentation and firewall rules should be implemented to restrict outbound HTTP requests from the LinkAce server to only necessary external destinations, blocking requests to internal IP ranges. Monitoring and logging HTTP requests made by the application can help detect suspicious scanning activity. Additionally, applying web application firewalls (WAFs) with SSRF detection capabilities can provide an extra layer of defense. Regularly reviewing and auditing user permissions and access logs will further reduce the risk of exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-62719: CWE-918: Server-Side Request Forgery (SSRF) in Kovah LinkAce
Description
LinkAce is a self-hosted archive to collect website links. In versions 2.3.0 and below, the htmlKeywordsFromUrl function in the FetchController class accepts user-provided URLs and makes HTTP requests to them without validating that the destination is not an internal or private network resource. This Server-Side Request Forgery (SSRF) vulnerability allows authenticated attackers to use the application server to perform port scanning and service discovery on internal networks. Practical impact is very limited because the function only extracts content from HTML meta keywords tags, which prevents meaningful data exfiltration from databases, APIs, or cloud metadata endpoints. This issue is fixed in version 2.4.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-62719 is a Server-Side Request Forgery (SSRF) vulnerability identified in Kovah's LinkAce, a self-hosted link archiving application. The vulnerability exists in versions 2.3.0 and earlier within the htmlKeywordsFromUrl function of the FetchController class. This function accepts URLs provided by authenticated users and performs HTTP requests to these URLs without validating whether the target is an internal or private network resource. Consequently, an attacker with valid credentials can leverage the application server to conduct port scanning and service discovery on internal network hosts that would otherwise be inaccessible externally. Despite this, the potential for data exfiltration is minimal because the function only extracts content from HTML meta keywords tags, which limits the ability to retrieve sensitive data from databases, APIs, or cloud metadata endpoints. The vulnerability does not require user interaction beyond authentication and has a low attack complexity. The CVSS 4.0 base score is 2.3, reflecting low severity due to limited impact and the requirement for authenticated access. No known exploits have been reported in the wild. The vulnerability was published on November 4, 2025, and has been addressed in LinkAce version 2.4.0, which includes proper validation to prevent SSRF attacks by restricting requests to internal or private network resources.
Potential Impact
For European organizations using LinkAce versions 2.3.0 or earlier, this SSRF vulnerability could allow authenticated users to perform reconnaissance on internal network infrastructure by scanning ports and discovering services. While the direct risk of data theft or system compromise is low due to the limited data extraction capability, the information gathered through port scanning could aid attackers in planning further attacks. This is particularly relevant for organizations with sensitive internal networks or segmented environments where external access is restricted. The vulnerability could also be leveraged in multi-tenant or shared hosting environments to map internal resources. However, since exploitation requires authentication, the threat is mitigated by strong access controls. The limited severity and absence of known exploits reduce immediate risk, but organizations should not ignore the potential for internal reconnaissance that could facilitate more serious attacks.
Mitigation Recommendations
European organizations should upgrade LinkAce installations to version 2.4.0 or later, where the SSRF vulnerability is fixed by validating and restricting URLs to prevent requests to internal or private network addresses. Until upgrading is possible, organizations should enforce strict authentication and authorization policies to limit access to trusted users only. Network segmentation and firewall rules should be implemented to restrict outbound HTTP requests from the LinkAce server to only necessary external destinations, blocking requests to internal IP ranges. Monitoring and logging HTTP requests made by the application can help detect suspicious scanning activity. Additionally, applying web application firewalls (WAFs) with SSRF detection capabilities can provide an extra layer of defense. Regularly reviewing and auditing user permissions and access logs will further reduce the risk of exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-20T19:41:22.741Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 690a797a9e609817bf7d7650
Added to database: 11/4/2025, 10:08:58 PM
Last enriched: 11/11/2025, 11:17:18 PM
Last updated: 12/18/2025, 7:37:36 AM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-68459: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Ruijie Networks Co., Ltd. AP180-PE V3.xx
HighCVE-2025-47387: CWE-822 Untrusted Pointer Dereference in Qualcomm, Inc. Snapdragon
HighCVE-2025-47382: CWE-863: Incorrect Authorization in Qualcomm, Inc. Snapdragon
HighCVE-2025-47372: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon
CriticalCVE-2025-47350: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.