Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2025-30200 | LinkAce is a self-hosted archive to collect website links. Prior to 2.3.1, a Stored Cross-Site Scripting (XSS) vulnerability has been identified on the /system/audit page. The application fails to properly sanitize the username field before it is rendered in the audit log. An authenticated attacker can set a malicious JavaScript payload as their username. When an action performed by this user is recorded (e.g., generate or revoke an API token), the payload is stored in the database. The script is then executed in the browser of any user, particularly administrators, who views the /system/audit page. This vulnerability is fixed in 2.3.1. | 
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 06 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Linkace
         Linkace linkace  | 
|
| CPEs | cpe:2.3:a:linkace:linkace:*:*:*:*:*:*:*:* | |
| Vendors & Products | 
        
        Linkace
         Linkace linkace  | 
Fri, 19 Sep 2025 09:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Linkace Project
         Linkace Project linkace  | 
|
| Vendors & Products | 
        
        Linkace Project
         Linkace Project linkace  | 
Thu, 18 Sep 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Thu, 18 Sep 2025 20:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | LinkAce is a self-hosted archive to collect website links. Prior to 2.3.1, a Stored Cross-Site Scripting (XSS) vulnerability has been identified on the /system/audit page. The application fails to properly sanitize the username field before it is rendered in the audit log. An authenticated attacker can set a malicious JavaScript payload as their username. When an action performed by this user is recorded (e.g., generate or revoke an API token), the payload is stored in the database. The script is then executed in the browser of any user, particularly administrators, who views the /system/audit page. This vulnerability is fixed in 2.3.1. | |
| Title | LinkAce Vulnerable to Stored XSS on the Audit Page | |
| Weaknesses | CWE-79 | |
| References | 
         | |
| Metrics | 
        
        cvssV3_1
         
  | 
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-18T20:05:47.823Z
Reserved: 2025-09-15T19:13:16.905Z
Link: CVE-2025-59424
Updated: 2025-09-18T20:05:44.993Z
Status : Analyzed
Published: 2025-09-18T20:15:38.500
Modified: 2025-10-06T15:03:32.200
Link: CVE-2025-59424
No data.
                        OpenCVE Enrichment
                    Updated: 2025-09-19T09:35:23Z
 EUVD