Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62720: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Kovah LinkAce

0
High
VulnerabilityCVE-2025-62720cvecve-2025-62720cwe-200cwe-284
Published: Tue Nov 04 2025 (11/04/2025, 22:03:09 UTC)
Source: CVE Database V5
Vendor/Project: Kovah
Product: LinkAce

Description

LinkAce is a self-hosted archive to collect website links. Versions 2.3.1 and below allow any authenticated user to export the entire database of links from all users in the system, including private links that should only be accessible to their owners. The HTML and CSV export functions in the ExportController class retrieve all links without applying any ownership or visibility filtering, effectively bypassing all access controls implemented elsewhere in the application. This issue is fixed in version 2.4.0.

AI-Powered Analysis

AILast updated: 11/04/2025, 22:18:22 UTC

Technical Analysis

CVE-2025-62720 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information) and CWE-284 (Improper Access Control) affecting Kovah's LinkAce, a self-hosted link archive application. Versions prior to 2.4.0 contain a critical flaw in the ExportController class, which handles exporting user links in HTML and CSV formats. The export functions fail to apply any ownership or visibility filtering, allowing any authenticated user to retrieve the entire database of links, including private links that should be restricted to their respective owners. This bypasses the application's access control mechanisms implemented elsewhere, effectively exposing sensitive user data to unauthorized actors. The vulnerability is remotely exploitable over the network without requiring elevated privileges beyond authentication and does not require user interaction. The CVSS 4.0 score of 7.1 reflects a high severity due to the network attack vector, low attack complexity, no need for privileges beyond authentication, and the high confidentiality impact. Although no known exploits are currently reported in the wild, the flaw presents a significant risk of data leakage. The issue was publicly disclosed on November 4, 2025, and fixed in LinkAce version 2.4.0. Organizations using vulnerable versions should prioritize upgrading and reviewing access controls to prevent unauthorized data exposure.

Potential Impact

For European organizations, this vulnerability poses a significant risk of sensitive information leakage. LinkAce is often used to manage and archive web links, which may include confidential business resources, internal documentation, or private research links. Unauthorized access to the entire link database can lead to exposure of proprietary information, intellectual property, or personal data, potentially violating GDPR and other privacy regulations. This could result in reputational damage, regulatory fines, and loss of competitive advantage. The vulnerability's exploitation requires only authenticated access, which could be obtained through compromised credentials or insider threats, increasing the risk. Additionally, the broad scope of data exposure affects all users within an organization, amplifying the potential damage. European entities relying on self-hosted productivity and knowledge management tools are particularly vulnerable if they have not applied the patch or implemented compensating controls.

Mitigation Recommendations

The primary mitigation is to upgrade all LinkAce instances to version 2.4.0 or later, where the export functionality properly enforces ownership and visibility filters. Organizations should audit their current LinkAce deployments to identify affected versions and prioritize patching. In parallel, review and tighten user authentication and authorization policies to limit access to trusted users only. Implement monitoring and alerting for unusual export activities or bulk data access patterns. Consider restricting export functionality to administrative roles or trusted personnel until the patch is applied. Additionally, conduct a thorough review of exported data to assess any potential data leakage and notify affected users if necessary. Employ network segmentation and access controls to limit exposure of the LinkAce server to only necessary internal users. Finally, educate users about credential security to reduce the risk of unauthorized authenticated access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-20T19:41:22.741Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690a797a9e609817bf7d7646

Added to database: 11/4/2025, 10:08:58 PM

Last enriched: 11/4/2025, 10:18:22 PM

Last updated: 11/5/2025, 1:47:50 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats