ClipBucket v5 is an open source video sharing platform. An authenticated time-based blind SQL injection vulnerability exists in ClipBucket prior to 5.5.3 #80 within the `actions/ajax.php` endpoint. Due to insufficient input sanitization of the `userid` parameter, an authenticated attacker can execute arbitrary SQL queries, leading to full database disclosure and potential administrative account takeover. Version 5.5.3 #80 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/MacWarrior/clipbucket-v5/commit/726d68b0c9d4c702dce2691c2759b6bf84a1691f | Patch |
| https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-2757-6cp4-v7xx | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-18 21:16
Updated : 2026-03-19 18:47
NVD link : CVE-2026-32321
Mitre link : CVE-2026-32321
CVE.ORG link : CVE-2026-32321
JSON object : View
Products Affected
oxygenz
- clipbucket
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
