CVE-2026-44313
LinkWarden: Server-Side Request Forgery (SSRF) in Link Creation via fetchTitleAndHeaders Function
CVSS Score
9.1
EPSS Score
0.0%
EPSS Percentile
0th
Linkwarden is a self-hosted, open-source collaborative bookmark manager to collect, organize and archive webpages. Prior to version 2.13.0, a Server-Side Request Forgery (SSRF) vulnerability in the fetchTitleAndHeaders function allows authenticated users to make arbitrary HTTP requests to internal services due to insufficient URL validation that only checks for "http://" or "https://" prefixes. This issue has been patched in version 2.13.0.
| CWE | CWE-918 |
| Vendor | linkwarden |
| Product | linkwarden |
| Published | May 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for linkwarden linkwarden
Be the first to know when new critical vulnerabilities affecting linkwarden linkwarden are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
Low
Availability
Low
Affected Versions
linkwarden / linkwarden
< 2.13.0