Back to VulnFeed / CVE-2026-7502
root@hackertop:~/vulnfeed/CVE-2026-7502#
CVE-2026-7502 MEDIUM CVE ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

LinkStackOrg LinkStack up to 4.8.6 Management Endpoint UserController.php saveLink authorization

LinkStack 21d ago Impact pending confirmation
LIFECYCLE
5.1 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in LinkStackOrg LinkStack up to 4.8.6. It has been classified as critical. Affected is the function saveLink of the file app/Http/Controllers/UserController.php of the component Management Endpoint. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Root Cause Analysis
CWE is classifying the issue as CWE-639. The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.

Impact: This is going to have an impact on integrity, and availability.

Exploit: The exploit is shared for download at github.com. It is declared as proof-of-concept. The pull request to fix this issue awaits acceptance. By approaching the search of inurl:app/Http/Controllers/UserController.php it is possible to find vulnerable targets with Google Hacking.

Countermeasure: There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-7502 · CVSS 5.1 · Active Threat