LinkAce is a self-hosted archive to collect website links. Prior to 2.5.4, LinkRepository::update and CheckLinksCommand::checkLink do not check for private IPs. An authenticated user can read responses from internal services (AWS IMDSv1, cloud metadata, internal APIs) by creating a link with a public URL and then updating it to a private IP. The links:check cron job makes the request server-side without IP filtering. This can expose cloud credentials, internal service data, and network topology. This vulnerability is fixed in 2.5.4.
Metrics
Affected Vendors & Products
References
History
Tue, 14 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linkace
Linkace linkace |
|
| CPEs | cpe:2.3:a:linkace:linkace:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Linkace
Linkace linkace |
Thu, 09 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kovah
Kovah linkace |
|
| Vendors & Products |
Kovah
Kovah linkace |
Tue, 07 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LinkAce is a self-hosted archive to collect website links. Prior to 2.5.4, LinkRepository::update and CheckLinksCommand::checkLink do not check for private IPs. An authenticated user can read responses from internal services (AWS IMDSv1, cloud metadata, internal APIs) by creating a link with a public URL and then updating it to a private IP. The links:check cron job makes the request server-side without IP filtering. This can expose cloud credentials, internal service data, and network topology. This vulnerability is fixed in 2.5.4. | |
| Title | LinkAce has SSRF via CheckLinksCommand - Link URL Update Bypasses laravel-html-meta Protection | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-04-07T15:14:45.891Z
Updated: 2026-04-09T14:36:27.061Z
Reserved: 2026-04-03T02:15:39.280Z
Link: CVE-2026-35516
Updated: 2026-04-09T14:36:13.913Z
Status : Analyzed
Published: 2026-04-07T16:16:27.937
Modified: 2026-04-14T20:27:53.187
Link: CVE-2026-35516
No data.