Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27458: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Kovah LinkAce

0
High
VulnerabilityCVE-2026-27458cvecve-2026-27458cwe-80
Published: Sat Feb 21 2026 (02/21/2026, 06:54:41 UTC)
Source: CVE Database V5
Vendor/Project: Kovah
Product: LinkAce

Description

LinkAce is a self-hosted archive to collect website links. Versions 2.4.2 and below have a Stored Cross-site Scripting vulnerability through the Atom feed endpoint for lists (/lists/feed). An authenticated user can inject a CDATA-breaking payload into a list description that escapes the XML CDATA section, injects a native SVG element into the Atom XML document, and executes arbitrary JavaScript directly in the browser when the feed URL is visited. No RSS reader or additional rendering context is required — the browser's native XML parser processes the injected SVG and fires the onload event handler. This vulnerability exists because the lists feed template outputs list descriptions using Blade's raw syntax ({!! !!}) without sanitization inside a CDATA block. The critical detail is that because the output sits inside <![CDATA[...]]>, an attacker can inject the sequence ]]> to close the CDATA section prematurely, then inject arbitrary XML/SVG elements that the browser parses and executes natively as part of the Atom document. This issue has been fixed in version 2.4.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 12:39:33 UTC

Technical Analysis

CVE-2026-27458 is a stored cross-site scripting vulnerability affecting Kovah LinkAce, a self-hosted link archive platform, in versions prior to 2.4.3. The flaw exists in the Atom feed endpoint (/lists/feed), where list descriptions are output using Blade's raw syntax ({!! !!}) inside an XML CDATA block without proper sanitization. An authenticated attacker can inject a payload containing the CDATA closing sequence (]]>) to prematurely terminate the CDATA section, then insert arbitrary XML/SVG elements, including an SVG with an onload event handler that executes JavaScript. Because the Atom feed is parsed natively by browsers' XML parsers, the injected script runs immediately when the feed URL is accessed, without requiring an RSS reader or additional rendering context. This bypasses typical XSS mitigations that rely on HTML context. The vulnerability stems from improper neutralization of script-related HTML tags (CWE-80) and unsafe template rendering practices. The vulnerability has a CVSS 4.0 score of 8.7, indicating high severity, with network attack vector, low attack complexity, no user interaction, and no privileges required beyond authentication. The issue was fixed in LinkAce version 2.4.3 by properly sanitizing the list descriptions or changing the rendering approach to prevent CDATA breaking and script injection.

Potential Impact

This vulnerability allows authenticated attackers to execute arbitrary JavaScript in the browsers of users who access the vulnerable Atom feed URL. Potential impacts include session hijacking, theft of authentication tokens or cookies, unauthorized actions performed on behalf of users, and distribution of malware or phishing content. Since the feed is XML parsed natively by browsers, the attack does not require an RSS reader or additional user interaction beyond visiting the feed URL, increasing the risk of automated or stealthy exploitation. Organizations using LinkAce for internal or external link archiving may expose sensitive user sessions or internal network resources if attackers leverage this vulnerability. The attack scope is limited to authenticated users injecting payloads, but the victim set includes any user or system consuming the feed. This can lead to compromise of user accounts, data leakage, and erosion of trust in the platform. The vulnerability's exploitation could also facilitate further attacks within the affected environment, such as privilege escalation or lateral movement, depending on the victim's privileges and environment.

Mitigation Recommendations

Upgrade Kovah LinkAce to version 2.4.3 or later, where this vulnerability is fixed. If immediate upgrade is not possible, implement strict input validation and sanitization on list descriptions to prevent injection of CDATA-breaking sequences and SVG/XML elements. Restrict access to the Atom feed endpoint to trusted users and networks to reduce exposure. Employ Content Security Policy (CSP) headers to restrict script execution sources and mitigate impact of injected scripts. Monitor and audit feed usage logs for suspicious activity or unexpected payloads. Educate users about the risks of visiting untrusted feed URLs. Consider disabling the Atom feed feature if it is not essential. Regularly review and update template rendering practices to avoid raw output of untrusted data, especially inside XML or HTML contexts. Implement web application firewalls (WAF) with rules to detect and block CDATA-breaking payloads or SVG injections targeting this endpoint.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-19T17:25:31.100Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69995bf9be58cf853b59312f

Added to database: 2/21/2026, 7:17:13 AM

Last enriched: 2/28/2026, 12:39:33 PM

Last updated: 4/7/2026, 1:39:57 PM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses