LinkAce Password Reset Flaw: Account Takeover Risk
The National Vulnerability Database (NVD) reports a critical password reset poisoning vulnerability, CVE-2026-40905, in LinkAce versions prior to 2.5.4. This self-hosted link archiving application is susceptible due to its improper handling of user-controlled HTTP headers, specifically X-Forwarded-Host.
Attackers can exploit this by manipulating the X-Forwarded-Host header during a password reset request. This injects an attacker-controlled domain into the password reset link sent to the victim. When the victim clicks this malicious link, their password reset token is unwittingly transmitted to the attacker’s server. This allows the attacker to capture the token, reset the victim’s password, and achieve full account takeover.
With a CVSS score of 8.1 (HIGH), this vulnerability poses a significant risk. Defenders running LinkAce must prioritize upgrading to version 2.5.4 immediately. This isn’t theoretical; it’s a direct path to compromise, leveraging a common web application misconfiguration pattern. Don’t assume your reverse proxy or load balancer mitigates this if LinkAce itself trusts the header.
What This Means For You
- If your organization uses LinkAce, you are exposed to full account takeover via password reset poisoning. Immediately check your LinkAce version; if it's prior to 2.5.4, patch it to 2.5.4 or later without delay. Review logs for suspicious password reset requests originating from unusual IPs or containing manipulated `X-Forwarded-Host` headers.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-40905 - LinkAce Password Reset Host Header Poisoning
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-40905 | Vulnerability | CVE-2026-40905 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 22, 2026 at 00:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.