Description
LinkAce is a self-hosted archive to collect website links. In 2.1.0 and earlier, the processTaxonomy() method in LinkRepository.php allows authenticated users to attach other users' private tags and lists to their own links by passing integer IDs.
Published: 2026-03-10
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized access to private tags and lists (IDOR)
Action: Patch Immediately
AI Analysis

Impact

LinkAce 2.1.0 and earlier contain a flaw in the processTaxonomy() method of LinkRepository.php that allows any authenticated user to attach private tags and lists belonging to other users to their own links by supplying integer IDs. This grants the malicious user the ability to associate or expose another user’s private organizational data, effectively bypassing intended per-user isolation. The weakness is a classic Insecure Direct Object Reference (CWE‑639) and results in unauthorized data manipulation rather than direct system compromise.

Affected Systems

The affected product is Kovah’s LinkAce. All releases prior to and including version 2.1.0 are impacted, as they include the vulnerable processTaxonomy() implementation. The exact patch version is not specified in the advisory, but any release subsequent to 2.1.0 that removes or restricts the ID reference should resolve the issue.

Risk and Exploitability

The CVSS v3.1 score for this issue is 5.3, indicating a moderate severity. EPSS is reported at less than 1 %, suggesting a low likelihood of widespread exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires a valid authenticated session and access to the vulnerable endpoint; therefore, only legitimate users can trigger the IDOR. Attackers would send requests with manipulated tag or list identifiers to attach the target’s private items to their own records. Because the flaw lies in the business‑logic layer, the attack is feasible for any user with normal privileges on the affected instance.

Generated by OpenCVE AI on March 17, 2026 at 17:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade LinkAce to a version that removes the vulnerable processTaxonomy() implementation. If an immediate upgrade is not possible, consider disabling or restricting the endpoint that allows tag/list attachment until a patch is released.
  • Monitor user activity logs for abnormal attachment patterns that could indicate exploitation of the IDOR.
  • Verify that all exposed APIs enforce proper ownership checks before allowing tags or lists to be associated with a user’s link.

Generated by OpenCVE AI on March 17, 2026 at 17:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Linkace
Linkace linkace
CPEs cpe:2.3:a:linkace:linkace:*:*:*:*:*:*:*:*
Vendors & Products Linkace
Linkace linkace
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Wed, 11 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Kovah
Kovah linkace
Vendors & Products Kovah
Kovah linkace

Tue, 10 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
Description LinkAce is a self-hosted archive to collect website links. In 2.1.0 and earlier, the processTaxonomy() method in LinkRepository.php allows authenticated users to attach other users' private tags and lists to their own links by passing integer IDs.
Title LinkAce has a Cross-User Tag/List Attachment IDOR in processTaxonomy()
Weaknesses CWE-639
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-11T14:30:40.687Z

Reserved: 2026-03-07T17:34:39.981Z

Link: CVE-2026-30954

cve-icon Vulnrichment

Updated: 2026-03-11T14:29:54.866Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T21:16:48.513

Modified: 2026-03-17T16:13:55.080

Link: CVE-2026-30954

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:33:56Z

Weaknesses