ClipBucket v5 is an open source video sharing platform. In versions 5.5.2 - #156 and below, an authenticated regular user can create a photo collection whose Collection Name contains HTML/JavaScript payloads, which making ClipBucket’s Manage Photos feature vulnerable to Stored XSS. The payload is rendered unsafely in the Admin → Manage Photos interface, causing it to execute in the administrator’s browser, therefore allowing an attacker to target administrators and perform actions with elevated privileges. This issue is fixed in version 5.5.2 - #157.
References
| Link | Resource |
|---|---|
| https://github.com/MacWarrior/clipbucket-v5/commit/8e3cf79ce2721fbebde68a05a9a1a6319f086bcc | Patch |
| https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-93rh-fxxx-j38j | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-11-07 05:16
Updated : 2025-12-31 18:30
NVD link : CVE-2025-64338
Mitre link : CVE-2025-64338
CVE.ORG link : CVE-2025-64338
JSON object : View
Products Affected
oxygenz
- clipbucket
