CVE-2025-62720: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Kovah LinkAce
LinkAce is a self-hosted archive to collect website links. Versions 2.3.1 and below allow any authenticated user to export the entire database of links from all users in the system, including private links that should only be accessible to their owners. The HTML and CSV export functions in the ExportController class retrieve all links without applying any ownership or visibility filtering, effectively bypassing all access controls implemented elsewhere in the application. This issue is fixed in version 2.4.0.
AI Analysis
Technical Summary
CVE-2025-62720 affects Kovah LinkAce, a self-hosted link archive application widely used for organizing and sharing website links. In versions 2.3.1 and earlier, the ExportController class responsible for exporting links via HTML or CSV formats fails to apply any ownership or visibility filtering. This means that any authenticated user can export the entire database of links, including private links that should only be accessible to their owners. The vulnerability stems from improper access control implementation (CWE-284) and results in exposure of sensitive information (CWE-200). Because the export functions retrieve all links indiscriminately, the confidentiality of all users' private links is compromised. Exploitation requires only authenticated access, no additional user interaction, and can be performed remotely over the network. The vulnerability was publicly disclosed on November 4, 2025, with no known exploits in the wild at the time of publication. The issue is resolved in LinkAce version 2.4.0, which enforces proper ownership and visibility checks during export operations. The CVSS 4.0 vector (AV:N/AC:L/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) reflects a network attack vector with low complexity, requiring low privileges but no user interaction, and resulting in high confidentiality impact without affecting integrity or availability.
Potential Impact
For European organizations, this vulnerability poses a significant risk of sensitive data leakage. LinkAce is often used by teams to manage and share curated links, some of which may contain confidential or proprietary information. Unauthorized export of all users' private links could lead to exposure of internal resources, intellectual property, or sensitive operational data. This could facilitate further attacks such as social engineering, phishing, or reconnaissance by adversaries. Organizations in regulated sectors (e.g., finance, healthcare, government) face additional compliance risks due to potential breaches of data protection laws like GDPR. The ease of exploitation combined with the broad scope of data exposure makes this vulnerability particularly impactful for enterprises relying on LinkAce for internal knowledge management. While no known exploits are reported yet, the vulnerability’s public disclosure increases the risk of active exploitation attempts.
Mitigation Recommendations
European organizations using Kovah LinkAce should immediately upgrade to version 2.4.0 or later, where the vulnerability is fixed by enforcing proper access control checks on export functions. Until upgrading is possible, organizations should restrict LinkAce access to trusted users only and consider disabling export functionality temporarily to prevent data leakage. Implement network segmentation and firewall rules to limit access to the LinkAce server. Monitor authentication logs for unusual export activity or large data downloads. Conduct an internal audit of exported data access and review user privileges to ensure minimal necessary access. Additionally, organizations should educate users about the risks of sharing credentials and enforce strong authentication mechanisms to reduce the risk of unauthorized access. Regularly applying security patches and maintaining an inventory of self-hosted applications will help prevent similar issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2025-62720: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Kovah LinkAce
Description
LinkAce is a self-hosted archive to collect website links. Versions 2.3.1 and below allow any authenticated user to export the entire database of links from all users in the system, including private links that should only be accessible to their owners. The HTML and CSV export functions in the ExportController class retrieve all links without applying any ownership or visibility filtering, effectively bypassing all access controls implemented elsewhere in the application. This issue is fixed in version 2.4.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-62720 affects Kovah LinkAce, a self-hosted link archive application widely used for organizing and sharing website links. In versions 2.3.1 and earlier, the ExportController class responsible for exporting links via HTML or CSV formats fails to apply any ownership or visibility filtering. This means that any authenticated user can export the entire database of links, including private links that should only be accessible to their owners. The vulnerability stems from improper access control implementation (CWE-284) and results in exposure of sensitive information (CWE-200). Because the export functions retrieve all links indiscriminately, the confidentiality of all users' private links is compromised. Exploitation requires only authenticated access, no additional user interaction, and can be performed remotely over the network. The vulnerability was publicly disclosed on November 4, 2025, with no known exploits in the wild at the time of publication. The issue is resolved in LinkAce version 2.4.0, which enforces proper ownership and visibility checks during export operations. The CVSS 4.0 vector (AV:N/AC:L/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) reflects a network attack vector with low complexity, requiring low privileges but no user interaction, and resulting in high confidentiality impact without affecting integrity or availability.
Potential Impact
For European organizations, this vulnerability poses a significant risk of sensitive data leakage. LinkAce is often used by teams to manage and share curated links, some of which may contain confidential or proprietary information. Unauthorized export of all users' private links could lead to exposure of internal resources, intellectual property, or sensitive operational data. This could facilitate further attacks such as social engineering, phishing, or reconnaissance by adversaries. Organizations in regulated sectors (e.g., finance, healthcare, government) face additional compliance risks due to potential breaches of data protection laws like GDPR. The ease of exploitation combined with the broad scope of data exposure makes this vulnerability particularly impactful for enterprises relying on LinkAce for internal knowledge management. While no known exploits are reported yet, the vulnerability’s public disclosure increases the risk of active exploitation attempts.
Mitigation Recommendations
European organizations using Kovah LinkAce should immediately upgrade to version 2.4.0 or later, where the vulnerability is fixed by enforcing proper access control checks on export functions. Until upgrading is possible, organizations should restrict LinkAce access to trusted users only and consider disabling export functionality temporarily to prevent data leakage. Implement network segmentation and firewall rules to limit access to the LinkAce server. Monitor authentication logs for unusual export activity or large data downloads. Conduct an internal audit of exported data access and review user privileges to ensure minimal necessary access. Additionally, organizations should educate users about the risks of sharing credentials and enforce strong authentication mechanisms to reduce the risk of unauthorized access. Regularly applying security patches and maintaining an inventory of self-hosted applications will help prevent similar issues.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-20T19:41:22.741Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 690a797a9e609817bf7d7646
Added to database: 11/4/2025, 10:08:58 PM
Last enriched: 11/11/2025, 11:17:31 PM
Last updated: 12/20/2025, 1:43:44 AM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-8065: CWE-400 Uncontrolled Resource Consumption in TP-Link Systems Inc. Tapo C200 V3
HighCVE-2025-14300: CWE-306 Missing Authentication for Critical Function in TP-Link Systems Inc. Tapo C200 V3
HighCVE-2025-14299: CWE-770 Allocation of Resources Without Limits or Throttling in TP-Link Systems Inc. Tapo C200 V3
HighCVE-2025-68613: CWE-913: Improper Control of Dynamically-Managed Code Resources in n8n-io n8n
CriticalCVE-2023-53959: Uncontrolled Search Path Element in filezilla-project FileZilla Client
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.