Description
A security vulnerability has been detected in LinkStackOrg LinkStack up to 4.8.6. The affected element is the function saveLink of the file app/Http/Controllers/UserController.php of the component Management Endpoint. The manipulation leads to authorization bypass. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The pull request to fix this issue awaits acceptance.
Published: 2026-04-30
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability targets the saveLink function in the UserController of LinkStack's management endpoint. The function accepts link data from remote users and, due to missing authorization checks, allows an attacker to craft requests that bypass standard user permissions, creating or updating links without proper privilege. This flaw falls under CWE‑285 (Improper Authorization) and CWE‑639 (Authorization Bypass Through User-Controlled Key). The impact is the ability for an unauthenticated or low‑privileged user to perform actions normally restricted to higher‑privileged roles, potentially leading to unauthorized data exposure or subsequent privilege escalation.

Affected Systems

LinkStack by LinkStackOrg, versions 4.8.6 and earlier. The vulnerability was detected in these releases up to 4.8.6 and remains unpatched until a new release is issued.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. The description states the attack can be initiated remotely, and the exploit has been publicly disclosed and may be used. As the pull request to fix the issue has not yet been merged, no official patch exists; attackers can potentially exploit this flaw until a downstream fix is applied.

Generated by OpenCVE AI on May 1, 2026 at 04:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Merge the pending pull request (https://github.com/LinkStackOrg/LinkStack/pull/975) into your codebase and redeploy the updated application.
  • Ensure the updated version (4.8.7 or newer) is running by checking the deployed version string.
  • If a patch cannot be applied immediately, restrict the saveLink endpoint so that only users with explicit elevated privileges can reach it, and add additional role checks around the link creation logic to prevent unauthorized use.

Generated by OpenCVE AI on May 1, 2026 at 04:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 01 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 01 May 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Linkstack
Linkstack linkstack
Vendors & Products Linkstack
Linkstack linkstack

Thu, 30 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in LinkStackOrg LinkStack up to 4.8.6. The affected element is the function saveLink of the file app/Http/Controllers/UserController.php of the component Management Endpoint. The manipulation leads to authorization bypass. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The pull request to fix this issue awaits acceptance.
Title LinkStackOrg LinkStack Management Endpoint UserController.php saveLink authorization
Weaknesses CWE-285
CWE-639
References
Metrics cvssV2_0

{'score': 5.5, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:P/E:POC/RL:ND/RC:C'}

cvssV3_0

{'score': 5.4, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:C'}

cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Linkstack Linkstack
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-01T14:23:54.744Z

Reserved: 2026-04-30T14:38:49.163Z

Link: CVE-2026-7502

cve-icon Vulnrichment

Updated: 2026-05-01T14:23:49.986Z

cve-icon NVD

Status : Deferred

Published: 2026-04-30T22:16:26.710

Modified: 2026-05-01T15:26:24.553

Link: CVE-2026-7502

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T08:15:12Z

Weaknesses