Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30953: CWE-918: Server-Side Request Forgery (SSRF) in Kovah LinkAce

0
High
VulnerabilityCVE-2026-30953cvecve-2026-30953cwe-918
Published: Tue Mar 10 2026 (03/10/2026, 20:38:48 UTC)
Source: CVE Database V5
Vendor/Project: Kovah
Product: LinkAce

Description

LinkAce is a self-hosted archive to collect website links. When a user creates a link via POST /links, the server fetches HTML metadata from the provided URL (LinkRepository::create() calls HtmlMeta::getFromUrl()). The LinkStoreRequest validation rules do not include NoPrivateIpRule, allowing server-side requests to internal network addresses, Docker service hostnames, and cloud metadata endpoints. The project already has a NoPrivateIpRule class (app/Rules/NoPrivateIpRule.php) but it is only applied in FetchController.php (line 99), not in the primary link creation path.

AI-Powered Analysis

AILast updated: 03/10/2026, 20:59:07 UTC

Technical Analysis

CVE-2026-30953 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918 affecting Kovah's LinkAce, a self-hosted link archiving platform. The vulnerability exists because the POST /links endpoint, which allows users to create new links, fetches HTML metadata from the provided URLs without enforcing the NoPrivateIpRule validation. This rule is designed to block requests to private IP ranges, Docker service hostnames, and cloud provider metadata endpoints to prevent SSRF attacks. However, the rule is only applied in a different controller (FetchController.php) and not in the main link creation path (LinkRepository::create() calling HtmlMeta::getFromUrl()). As a result, an attacker with low privileges can submit a crafted URL that causes the server to make unauthorized HTTP requests to internal network resources. This can lead to information disclosure of sensitive internal services, cloud metadata endpoints (which may contain credentials or tokens), and potentially enable further lateral movement or privilege escalation within the victim's network. The vulnerability affects all LinkAce versions up to and including 2.0.0. The CVSS v3.1 score is 7.7 (High), with an attack vector of network, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality with a scope change. No public exploits have been reported yet, but the presence of internal network access makes this a critical concern for organizations using LinkAce in sensitive environments.

Potential Impact

The SSRF vulnerability in LinkAce can have severe consequences for organizations. By exploiting this flaw, attackers can make the vulnerable server perform unauthorized HTTP requests to internal network services that are otherwise inaccessible externally. This can lead to exposure of sensitive internal endpoints such as Docker service APIs, internal management consoles, and cloud metadata services that often contain credentials or tokens. Disclosure of such information can facilitate further attacks including privilege escalation, data exfiltration, and lateral movement within the network. Since LinkAce is often deployed in self-hosted environments, including enterprises and service providers, the risk extends to any organization using this software without patching. The vulnerability's exploitation could compromise confidentiality without affecting integrity or availability directly, but the resulting information leakage can enable more damaging attacks. The requirement for low privileges means that even non-administrative users or compromised accounts can leverage this flaw, increasing the attack surface. Overall, the impact is high, especially in cloud or containerized environments where metadata endpoints are critical.

Mitigation Recommendations

To mitigate CVE-2026-30953, organizations should upgrade LinkAce to a version where the NoPrivateIpRule validation is correctly applied to all URL fetch operations, especially the primary link creation endpoint. If an official patch is not yet available, administrators should implement custom input validation to block URLs resolving to private IP ranges, Docker hostnames, and known cloud metadata endpoints before processing them. Network-level controls such as firewall rules or egress filtering can be employed to restrict the LinkAce server from making outbound HTTP requests to internal IP ranges and cloud metadata IP addresses (e.g., 169.254.169.254). Additionally, running LinkAce with the least privileges necessary and isolating it in a segmented network zone can reduce the risk of lateral movement if exploited. Monitoring logs for unusual outbound requests from the LinkAce server may help detect exploitation attempts. Finally, educating users about the risks of submitting internal URLs and enforcing strict access controls on the LinkAce application will further reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-07T17:34:39.980Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b082c52f860ef943b7fd49

Added to database: 3/10/2026, 8:44:53 PM

Last enriched: 3/10/2026, 8:59:07 PM

Last updated: 3/13/2026, 3:28:18 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses