Description
Linkwarden is a self-hosted, open-source collaborative bookmark manager to collect, organize and archive webpages. In versions 2.14.0 and prior, the archive upload endpoint (POST /api/v1/archives/[linkId]?format=4) accepts HTML files (text/html) without sanitizing JavaScript content. When the archive is later accessed via GET /api/v1/archives/[linkId]?format=4, the HTML is served with Content-Type: text/html from the Linkwarden origin, without any Content-Security-Policy header. This allows arbitrary JavaScript execution in the context of the authenticated Linkwarden sessio. At time of publication, there are no publicly available patches.
Published: 2026-05-08
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a stored cross‑site scripting flaw that originates from the archive upload endpoint in Linkwarden. HTML files can be uploaded without any sanitization of embedded JavaScript. When a user later retrieves the archived page, the server serves the document with a text/html content type and no content‑security‑policy header. Because the response is served from the same origin as the authenticated Linkwarden session, an attacker who can upload a malicious archive gains the ability to run JavaScript in the context of that session and may potentially steal authentication tokens, based on the description, it is inferred that the attacker could compromise user session data. The weakness is a classic client‑side injection problem.

Affected Systems

This issue affects the self‑hosted, open‑source Linkwarden bookmark manager provided by the vendor linkwarden. All releases up to and including 2.14.0 are vulnerable; versions newer than 2.14.0 are not known to contain the flaw.

Risk and Exploitability

The CVSS score of 8.8 reflects high severity, and the attack path is straightforward: an authenticated user with upload permissions can directly place malicious script in an archived page. Because the server does not enforce any CSP header, the script runs with full privileges of the logged‑in user. No exploit code is publicly available, and the vulnerability is not listed in the CISA KEV catalog, but the absence of an mitigation measure suggests that the risk remains high in environments that allow custom archive uploads.

Generated by OpenCVE AI on May 9, 2026 at 01:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Wait for an official patch from Linkwarden and apply it as soon as possible
  • If a patch is not yet available, disable archive upload functionality or restrict the upload MIME type to non‑HTML content
  • Implement server‑side content sanitization or add a strict content‑security‑policy header to the archive download responses to mitigate the risk

Generated by OpenCVE AI on May 9, 2026 at 01:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 23:30:00 +0000

Type Values Removed Values Added
Description Linkwarden is a self-hosted, open-source collaborative bookmark manager to collect, organize and archive webpages. In versions 2.14.0 and prior, the archive upload endpoint (POST /api/v1/archives/[linkId]?format=4) accepts HTML files (text/html) without sanitizing JavaScript content. When the archive is later accessed via GET /api/v1/archives/[linkId]?format=4, the HTML is served with Content-Type: text/html from the Linkwarden origin, without any Content-Security-Policy header. This allows arbitrary JavaScript execution in the context of the authenticated Linkwarden sessio. At time of publication, there are no publicly available patches.
Title LinkWarden: Stored XSS via Client-Side Archive Upload (Unsanitized HTML served from same origin)
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-08T23:10:11.218Z

Reserved: 2026-04-27T13:55:58.693Z

Link: CVE-2026-42455

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-09T00:16:29.180

Modified: 2026-05-09T00:16:29.180

Link: CVE-2026-42455

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T01:30:16Z

Weaknesses