Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62720: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Kovah LinkAce

0
High
VulnerabilityCVE-2025-62720cvecve-2025-62720cwe-200cwe-284
Published: Tue Nov 04 2025 (11/04/2025, 22:03:09 UTC)
Source: CVE Database V5
Vendor/Project: Kovah
Product: LinkAce

Description

LinkAce is a self-hosted archive to collect website links. Versions 2.3.1 and below allow any authenticated user to export the entire database of links from all users in the system, including private links that should only be accessible to their owners. The HTML and CSV export functions in the ExportController class retrieve all links without applying any ownership or visibility filtering, effectively bypassing all access controls implemented elsewhere in the application. This issue is fixed in version 2.4.0.

AI-Powered Analysis

AILast updated: 11/11/2025, 23:17:31 UTC

Technical Analysis

CVE-2025-62720 affects Kovah LinkAce, a self-hosted link archive application widely used for organizing and sharing website links. In versions 2.3.1 and earlier, the ExportController class responsible for exporting links via HTML or CSV formats fails to apply any ownership or visibility filtering. This means that any authenticated user can export the entire database of links, including private links that should only be accessible to their owners. The vulnerability stems from improper access control implementation (CWE-284) and results in exposure of sensitive information (CWE-200). Because the export functions retrieve all links indiscriminately, the confidentiality of all users' private links is compromised. Exploitation requires only authenticated access, no additional user interaction, and can be performed remotely over the network. The vulnerability was publicly disclosed on November 4, 2025, with no known exploits in the wild at the time of publication. The issue is resolved in LinkAce version 2.4.0, which enforces proper ownership and visibility checks during export operations. The CVSS 4.0 vector (AV:N/AC:L/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) reflects a network attack vector with low complexity, requiring low privileges but no user interaction, and resulting in high confidentiality impact without affecting integrity or availability.

Potential Impact

For European organizations, this vulnerability poses a significant risk of sensitive data leakage. LinkAce is often used by teams to manage and share curated links, some of which may contain confidential or proprietary information. Unauthorized export of all users' private links could lead to exposure of internal resources, intellectual property, or sensitive operational data. This could facilitate further attacks such as social engineering, phishing, or reconnaissance by adversaries. Organizations in regulated sectors (e.g., finance, healthcare, government) face additional compliance risks due to potential breaches of data protection laws like GDPR. The ease of exploitation combined with the broad scope of data exposure makes this vulnerability particularly impactful for enterprises relying on LinkAce for internal knowledge management. While no known exploits are reported yet, the vulnerability’s public disclosure increases the risk of active exploitation attempts.

Mitigation Recommendations

European organizations using Kovah LinkAce should immediately upgrade to version 2.4.0 or later, where the vulnerability is fixed by enforcing proper access control checks on export functions. Until upgrading is possible, organizations should restrict LinkAce access to trusted users only and consider disabling export functionality temporarily to prevent data leakage. Implement network segmentation and firewall rules to limit access to the LinkAce server. Monitor authentication logs for unusual export activity or large data downloads. Conduct an internal audit of exported data access and review user privileges to ensure minimal necessary access. Additionally, organizations should educate users about the risks of sharing credentials and enforce strong authentication mechanisms to reduce the risk of unauthorized access. Regularly applying security patches and maintaining an inventory of self-hosted applications will help prevent similar issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-20T19:41:22.741Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690a797a9e609817bf7d7646

Added to database: 11/4/2025, 10:08:58 PM

Last enriched: 11/11/2025, 11:17:31 PM

Last updated: 12/20/2025, 1:43:44 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats