CVE-2026-21875

ClipBucket · ClipBucket Multiple Products

A critical vulnerability exists in ClipBucket v5 (versions 5.5.2-#187 and below), an open-source video sharing platform.

Executive summary

A critical vulnerability exists in ClipBucket v5 (versions 5.5.2-#187 and below), an open-source video sharing platform. This flaw allows an unauthenticated attacker to inject malicious SQL commands through the channel comment section, potentially leading to a complete compromise of the application's database. Successful exploitation could result in the theft of sensitive user data, unauthorized modification of content, and a full takeover of the platform.

Vulnerability

The vulnerability is a Blind SQL Injection that occurs in the channel commenting feature. When a user submits a comment, a POST request is sent to the /actions/ajax.php endpoint. The obj_id parameter within this request is passed directly to a database query without proper sanitization or the use of prepared statements. An attacker can manipulate the obj_id parameter with malicious SQL syntax (e.g., 1' or 1=1-- -) to alter the logic of the backend database query, allowing them to extract or manipulate database information.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8, posing a significant risk to the organization. Exploitation could lead to a severe data breach, exposing sensitive user information such as usernames, hashed passwords, email addresses, and private video data. This could result in reputational damage, regulatory fines, and loss of customer trust. Furthermore, an attacker could potentially modify or delete data, disrupt service availability, or, depending on database user privileges, escalate their access to gain control over the underlying server.

Remediation

Immediate Action: Update ClipBucket Multiple Products to the latest version. Check vendor security advisory for specific patch details. Monitor for exploitation attempts and review access logs.

Proactive Monitoring: Actively monitor web server and database logs for suspicious activity. Specifically, scrutinize POST requests to /actions/ajax.php for any SQL-like syntax or anomalous patterns within the obj_id parameter. Implement alerts for a high volume of database errors, which can indicate failed SQL injection attempts.

Compensating Controls: If immediate patching is not feasible, deploy a Web Application Firewall (WAF) with rules specifically designed to detect and block SQL injection attacks. Implement strict input validation on all user-supplied data at the application or web server level. Ensure the database user account used by the application has the minimum necessary permissions (principle of least privilege) to limit the impact of a potential breach.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Given the critical CVSS score of 9.8 and the ease of exploitation, this vulnerability requires immediate attention. We strongly recommend that organizations using affected versions of ClipBucket implement the suggested compensating controls, particularly a Web Application Firewall, without delay. Although this vulnerability is not currently on the CISA KEV list, its severity warrants treating it as an active and critical threat. Administrators must be prepared to apply the official patch from the vendor as soon as it becomes available.