Cyber Posture

CVE-2026-33953

HighPublic PoC

Published: 27 March 2026

Published
27 March 2026
Modified
31 March 2026
KEV Added
Patch
CVSS Score 8.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
EPSS Score 0.0004 11.4th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33953 is a high-severity SSRF (CWE-918) vulnerability in Linkace Linkace. Its CVSS base score is 8.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 11.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SC-7 (Boundary Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Validates user-submitted links and hostnames to prevent SSRF exploitation by blocking requests to internal-only resources.

prevent

Enforces information flow control policies prohibiting the LinkAce server from making unauthorized requests to internal services via submitted hostnames.

prevent

Monitors and controls outbound communications from the application server to internal networks, blocking SSRF-triggered requests.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1046 Network Service Discovery Discovery
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.
Why these techniques?

SSRF in public-facing self-hosted web app directly enables T1190 exploitation by low-priv authenticated users; SSRF to internal hostnames facilitates internal network service discovery (T1046) for confidential data exposure.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

LinkAce is a self-hosted archive to collect website links. Versions prior to 2.5.3 block direct requests to private IP literals, but still performs server-side requests to internal-only resources when those resources are referenced through an internal hostname. This allows an…

more

authenticated user to trigger server-side requests to internal services reachable by the LinkAce server but not directly reachable by an external user. Version 2.5.3 patches the issue.

Deeper analysisAI

CVE-2026-33953 is a server-side request forgery (SSRF) vulnerability, classified under CWE-918, affecting LinkAce, a self-hosted archive application for collecting website links. Versions prior to 2.5.3 block direct requests to private IP literals but fail to prevent server-side requests to internal-only resources when referenced via internal hostnames. The vulnerability carries a CVSS v3.1 base score of 8.5 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N), indicating high severity due to its potential for confidential data exposure across security scopes.

An authenticated user with low privileges can exploit this flaw remotely over the network with low complexity and no user interaction required. By submitting links with internal hostnames, the attacker triggers the LinkAce server to make requests to internal services that are reachable from the server but not exposed externally, potentially allowing unauthorized access to sensitive internal resources and high-impact confidentiality breaches with limited integrity disruption.

The GitHub Security Advisory (GHSA-wp4g-qw9j-wfjg) confirms that LinkAce version 2.5.3 addresses the issue by patching the server-side request handling. Security practitioners should upgrade to version 2.5.3 or later and review access controls for authenticated users to mitigate exploitation risks.

Details

CWE(s)

Affected Products

linkace
linkace
≤ 2.5.3

CVEs Like This One

CVE-2026-30953Same product: Linkace Linkace
CVE-2026-0686Shared CWE-918
CVE-2025-1849Shared CWE-918
CVE-2025-1848Shared CWE-918
CVE-2026-4528Shared CWE-918
CVE-2025-27777Shared CWE-918
CVE-2026-40242Shared CWE-918
CVE-2026-43526Shared CWE-918
CVE-2026-5418Shared CWE-918
CVE-2023-53899Shared CWE-918

References