Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62430: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MacWarrior clipbucket-v5

0
Medium
VulnerabilityCVE-2025-62430cvecve-2025-62430cwe-79
Published: Fri Oct 17 2025 (10/17/2025, 17:50:23 UTC)
Source: CVE Database V5
Vendor/Project: MacWarrior
Product: clipbucket-v5

Description

CVE-2025-62430 is a stored cross-site scripting (XSS) vulnerability in ClipBucket v5 versions prior to build 5. 5. 2 #146. It affects multiple video and photo metadata fields where user input is not properly sanitized, allowing malicious script injection. An attacker with edit permissions on videos or photos can inject scripts that execute when any user, including unauthenticated visitors or administrators, views the affected pages. Although HttpOnly cookies prevent direct cookie theft, the injected scripts can perform unauthorized fetch requests to sensitive admin endpoints, potentially leaking data or triggering unintended actions. The vulnerability has a CVSS score of 5. 4 (medium severity) and requires user interaction to trigger. The issue is fixed in build 5. 5.

AI-Powered Analysis

AILast updated: 10/24/2025, 18:22:14 UTC

Technical Analysis

CVE-2025-62430 is a stored cross-site scripting (XSS) vulnerability identified in the open-source video sharing platform ClipBucket v5, specifically affecting versions prior to build 5.5.2 #146. The vulnerability arises due to improper neutralization of user-supplied input in multiple metadata fields associated with videos and photos. For videos, the Tags, Genre, Actors, Producer, Executive Producer, and Director fields within Movieinfos do not adequately sanitize input, while for photos, the Photo Title and Photo Tags fields are similarly vulnerable. An attacker with permissions to edit video or photo metadata can inject malicious JavaScript code by inserting crafted input, such as closing delimiters followed by script elements. When any user, including unauthenticated visitors or administrators, views the affected video or photo page, the injected script executes in their browser context. Although cookies are set with the HttpOnly attribute, preventing direct cookie theft via JavaScript, the malicious script can issue fetch requests to sensitive endpoints like admin_area pages. This can lead to unauthorized data exfiltration or unintended administrative actions. The vulnerability does not require prior authentication to exploit the script execution, but the attacker must have editing rights on the media content. The CVSS 3.1 base score is 5.4, reflecting medium severity, with an attack vector of network, low attack complexity, no privileges required for script execution, but user interaction is necessary (viewing the page). The vulnerability affects confidentiality and integrity but not availability. The issue was publicly disclosed on October 17, 2025, and fixed in build 5.5.2 #146. No known workarounds exist, making patching the only effective mitigation.

Potential Impact

For European organizations using ClipBucket v5 in versions prior to build 5.5.2 #146, this vulnerability poses a significant risk to the confidentiality and integrity of their web applications. Attackers with editing permissions can inject malicious scripts that execute in the browsers of site visitors, including administrators, potentially leading to unauthorized data access or manipulation. This can result in leakage of sensitive administrative data, unauthorized changes to content or settings, and erosion of user trust. Since the vulnerability affects publicly accessible video and photo pages, it can be exploited by unauthenticated users if they can gain editing rights, for example via compromised accounts or weak access controls. The impact is heightened in organizations that rely on ClipBucket for media sharing with sensitive or proprietary content. While availability is not directly affected, the reputational damage and potential regulatory consequences under GDPR for data breaches could be substantial. The medium CVSS score reflects moderate risk, but the ease of exploitation by insiders or compromised users increases the threat level. European entities operating media platforms or community sites using ClipBucket should consider this vulnerability a priority for remediation to prevent exploitation.

Mitigation Recommendations

The primary mitigation is to upgrade ClipBucket v5 installations to build 5.5.2 #146 or later, where the vulnerability has been fixed. Since no known workarounds exist, patching is critical. Additionally, organizations should enforce strict access controls to limit who can edit video and photo metadata, reducing the risk of malicious input injection. Implementing web application firewalls (WAFs) with rules to detect and block common XSS payloads in metadata fields can provide temporary protection. Regularly audit user permissions and monitor logs for unusual editing activity. Employ Content Security Policy (CSP) headers to restrict script execution sources, mitigating the impact of injected scripts. Conduct security awareness training for administrators and content editors to recognize suspicious behavior. Finally, perform periodic vulnerability scanning and penetration testing on ClipBucket deployments to detect similar injection flaws proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-13T16:26:12.181Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f284899c34d0947f39a008

Added to database: 10/17/2025, 6:01:45 PM

Last enriched: 10/24/2025, 6:22:14 PM

Last updated: 12/3/2025, 11:53:44 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats