CVE-2025-59334

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-59334
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-59334.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-59334
Related
  • GHSA-6wph-mpv2-29xv
Published
2025-09-16T17:15:41Z
Modified
2025-09-18T04:48:33.491057Z
Summary
[none]
Details

Linkr is a lightweight file delivery system that downloads files from a webserver. Linkr versions through 2.0.0 do not verify the integrity or authenticity of .linkr manifest files before using their contents, allowing a tampered manifest to inject arbitrary file entries into a package distribution. An attacker can modify a generated .linkr manifest (for example by adding a new entry with a malicious URL) and when a user runs the extract command the client downloads the attacker-supplied file without verification. This enables arbitrary file injection and creates a potential path to remote code execution if a downloaded malicious binary or script is later executed. Version 2.0.1 adds a manifest integrity check that compares the checksum of the original author-created manifest to the one being extracted and aborts on mismatch, warning if no original manifest is hosted. Users should update to 2.0.1 or later. As a workaround prior to updating, use only trusted .linkr manifests, manually verify manifest integrity, and host manifests on trusted servers.

References

Affected packages

Git / github.com/mohammadzain2008/linkr

Affected ranges

Type
GIT
Repo
https://github.com/mohammadzain2008/linkr
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1.0-alpha

v1.*

v1.0.0

v2.*

v2.0.0