Back to VulnFeed / CVE-2026-7501
root@hackertop:~/vulnfeed/CVE-2026-7501#
CVE-2026-7501 LOW CVE ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

LinkStackOrg LinkStack up to 4.8.6 UserController.php editPage pageDescription cross site scripting

LinkStack 21d ago Impact pending confirmation
LIFECYCLE
3.2 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in LinkStackOrg LinkStack up to 4.8.6 and classified as problematic. This issue affects the function editPage of the file app/Http/Controllers/UserController.php. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Root Cause Analysis
The manipulation of the argument pageDescription with an unknown input leads to a unknown weakness. Using CWE to declare the problem leads to CWE-79. The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Impact: Impacted is integrity.

Exploit: The exploit is available at github.com. It is declared as proof-of-concept. The project was informed of the problem early through a pull request but has not reacted yet. By approaching the search of inurl:app/Http/Controllers/UserController.php it is possible to find vulnerable targets with Google Hacking.

Countermeasure: There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-7501 · CVSS 3.2 · Active Threat