CVE-2025-62720
BaseFortify
Publication date: 2025-11-04
Last updated on: 2025-11-10
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linkace | linkace | to 2.4.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in LinkAce versions 2.3.1 and below allows any authenticated user to export the entire database of links from all users, including private links that should only be accessible to their owners. The export functions do not apply ownership or visibility filtering, bypassing access controls and exposing private data.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized disclosure of private links belonging to other users, potentially exposing sensitive or confidential information. This can result in privacy breaches and loss of trust among users of the system.
What immediate steps should I take to mitigate this vulnerability?
Upgrade LinkAce to version 2.4.0 or later, as this version fixes the vulnerability by applying proper ownership and visibility filtering to the export functions. Until the upgrade can be performed, restrict authenticated user access to the export functionality to prevent unauthorized data export.