πŸ” CVE Alert

CVE-2026-40905

HIGH 8.1

LinkAce: Password Reset Poisoning via X-Forwarded-Host Header Injection Leading to Account Takeover

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th

LinkAce is a self-hosted archive to collect website links. Prior to 2.5.4, a password reset poisoning vulnerability was identified in the application due to improper trust of user-controlled HTTP headers. The application uses the X-Forwarded-Host header when generating password reset URLs. By manipulating this header during a password reset request, an attacker can inject an attacker-controlled domain into the reset link sent via email. As a result, the victim receives a password reset email containing a malicious link pointing to an attacker-controlled domain. When the victim clicks the link, the password reset token is transmitted to the attacker-controlled server. An attacker can capture this token and use it to reset the victim’s password, leading to full account takeover. This vulnerability is fixed in 2.5.4.

CWE CWE-601
Vendor kovah
Product linkace
Published Apr 21, 2026
Last Updated Apr 21, 2026
Stay Ahead of the Next One

Get instant alerts for kovah linkace

Be the first to know when new high vulnerabilities affecting kovah linkace are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

Kovah / LinkAce
< 2.5.4

References

NVD β†— CVE.org β†— EPSS Data β†—
github.com: https://github.com/Kovah/LinkAce/security/advisories/GHSA-48wv-jpf4-vjfv