Description
LinkAce is a self-hosted archive to collect website links. Versions prior to 2.5.3 block direct requests to private IP literals, but still performs server-side requests to internal-only resources when those resources are referenced through an internal hostname. This allows an authenticated user to trigger server-side requests to internal services reachable by the LinkAce server but not directly reachable by an external user. Version 2.5.3 patches the issue.
Published: 2026-03-27
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Immediate Patch
AI Analysis

Impact

LinkAce implements a firewall that blocks direct requests to private IP addresses, but this protection can be bypassed when an internal hostname is used. The vulnerability is an instance of Server‑Side Request Forgery, CWE‑918, that allows an authenticated user to force the application to resolve an internal hostname and reach internal‑only resources. This could expose sensitive data or enable lateral movement within the internal network.

Affected Systems

The flaw exists in Kovah’s LinkAce releases older than version 2.5.3, where the SSRF protection fails to block requests originating from internal hostnames. Version 2.5.3 introduces the fix that fully blocks such SSRF attempts.

Risk and Exploitability

The CVSS score of 8.5 indicates high severity, but the EPSS score of less than 1 % suggests low exploitation probability. The vulnerability is not listed in CISA’s KEV catalog. Attack requires user authentication and the ability to specify internal hostnames, limiting impact to privileged accounts. Despite the low likelihood of exploitation, the potential damage warrants immediate remediation.

Generated by OpenCVE AI on March 31, 2026 at 20:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade LinkAce to version 2.5.3 or later to eliminate the SSRF flaw
  • If an upgrade is not immediately possible, restrict LinkAce’s outbound network traffic to exclude internal hostnames or apply firewall rules blocking requests to private service ranges
  • Monitor server logs for unexpected internal hostname resolutions or outbound HTTP requests that may indicate residual SSRF activity

Generated by OpenCVE AI on March 31, 2026 at 20:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Linkace
Linkace linkace
CPEs cpe:2.3:a:linkace:linkace:*:*:*:*:*:*:*:*
Vendors & Products Linkace
Linkace linkace

Mon, 30 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Kovah
Kovah linkace
Vendors & Products Kovah
Kovah linkace

Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Description LinkAce is a self-hosted archive to collect website links. Versions prior to 2.5.3 block direct requests to private IP literals, but still performs server-side requests to internal-only resources when those resources are referenced through an internal hostname. This allows an authenticated user to trigger server-side requests to internal services reachable by the LinkAce server but not directly reachable by an external user. Version 2.5.3 patches the issue.
Title LinkAce's SSRF protection can be bypassed via internal hostname resolution in LinkAce
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-30T15:39:58.365Z

Reserved: 2026-03-24T19:50:52.106Z

Link: CVE-2026-33953

cve-icon Vulnrichment

Updated: 2026-03-30T15:39:54.533Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T22:16:21.760

Modified: 2026-03-31T17:57:08.543

Link: CVE-2026-33953

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:11:53Z

Weaknesses