CVE-2025-62430: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MacWarrior clipbucket-v5
CVE-2025-62430 is a stored cross-site scripting (XSS) vulnerability in ClipBucket v5 versions prior to build 5. 5. 2 #146. It affects multiple video and photo metadata fields where user input is not properly sanitized, allowing malicious script injection. An attacker with edit permissions on videos or photos can inject scripts that execute when any user, including unauthenticated visitors or administrators, views the affected pages. Although HttpOnly cookies prevent direct cookie theft, the injected scripts can perform unauthorized fetch requests to sensitive admin endpoints, potentially leaking data or triggering unintended actions. The vulnerability has a CVSS score of 5. 4 (medium severity) and requires user interaction to trigger. The issue is fixed in build 5. 5.
AI Analysis
Technical Summary
CVE-2025-62430 is a stored cross-site scripting (XSS) vulnerability identified in the open-source video sharing platform ClipBucket v5, specifically affecting versions prior to build 5.5.2 #146. The vulnerability arises due to improper neutralization of user-supplied input in multiple metadata fields associated with videos and photos. For videos, the Tags, Genre, Actors, Producer, Executive Producer, and Director fields within Movieinfos do not adequately sanitize input, while for photos, the Photo Title and Photo Tags fields are similarly vulnerable. An attacker with permissions to edit video or photo metadata can inject malicious JavaScript code by inserting crafted input, such as closing delimiters followed by script elements. When any user, including unauthenticated visitors or administrators, views the affected video or photo page, the injected script executes in their browser context. Although cookies are set with the HttpOnly attribute, preventing direct cookie theft via JavaScript, the malicious script can issue fetch requests to sensitive endpoints like admin_area pages. This can lead to unauthorized data exfiltration or unintended administrative actions. The vulnerability does not require prior authentication to exploit the script execution, but the attacker must have editing rights on the media content. The CVSS 3.1 base score is 5.4, reflecting medium severity, with an attack vector of network, low attack complexity, no privileges required for script execution, but user interaction is necessary (viewing the page). The vulnerability affects confidentiality and integrity but not availability. The issue was publicly disclosed on October 17, 2025, and fixed in build 5.5.2 #146. No known workarounds exist, making patching the only effective mitigation.
Potential Impact
For European organizations using ClipBucket v5 in versions prior to build 5.5.2 #146, this vulnerability poses a significant risk to the confidentiality and integrity of their web applications. Attackers with editing permissions can inject malicious scripts that execute in the browsers of site visitors, including administrators, potentially leading to unauthorized data access or manipulation. This can result in leakage of sensitive administrative data, unauthorized changes to content or settings, and erosion of user trust. Since the vulnerability affects publicly accessible video and photo pages, it can be exploited by unauthenticated users if they can gain editing rights, for example via compromised accounts or weak access controls. The impact is heightened in organizations that rely on ClipBucket for media sharing with sensitive or proprietary content. While availability is not directly affected, the reputational damage and potential regulatory consequences under GDPR for data breaches could be substantial. The medium CVSS score reflects moderate risk, but the ease of exploitation by insiders or compromised users increases the threat level. European entities operating media platforms or community sites using ClipBucket should consider this vulnerability a priority for remediation to prevent exploitation.
Mitigation Recommendations
The primary mitigation is to upgrade ClipBucket v5 installations to build 5.5.2 #146 or later, where the vulnerability has been fixed. Since no known workarounds exist, patching is critical. Additionally, organizations should enforce strict access controls to limit who can edit video and photo metadata, reducing the risk of malicious input injection. Implementing web application firewalls (WAFs) with rules to detect and block common XSS payloads in metadata fields can provide temporary protection. Regularly audit user permissions and monitor logs for unusual editing activity. Employ Content Security Policy (CSP) headers to restrict script execution sources, mitigating the impact of injected scripts. Conduct security awareness training for administrators and content editors to recognize suspicious behavior. Finally, perform periodic vulnerability scanning and penetration testing on ClipBucket deployments to detect similar injection flaws proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-62430: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MacWarrior clipbucket-v5
Description
CVE-2025-62430 is a stored cross-site scripting (XSS) vulnerability in ClipBucket v5 versions prior to build 5. 5. 2 #146. It affects multiple video and photo metadata fields where user input is not properly sanitized, allowing malicious script injection. An attacker with edit permissions on videos or photos can inject scripts that execute when any user, including unauthenticated visitors or administrators, views the affected pages. Although HttpOnly cookies prevent direct cookie theft, the injected scripts can perform unauthorized fetch requests to sensitive admin endpoints, potentially leaking data or triggering unintended actions. The vulnerability has a CVSS score of 5. 4 (medium severity) and requires user interaction to trigger. The issue is fixed in build 5. 5.
AI-Powered Analysis
Technical Analysis
CVE-2025-62430 is a stored cross-site scripting (XSS) vulnerability identified in the open-source video sharing platform ClipBucket v5, specifically affecting versions prior to build 5.5.2 #146. The vulnerability arises due to improper neutralization of user-supplied input in multiple metadata fields associated with videos and photos. For videos, the Tags, Genre, Actors, Producer, Executive Producer, and Director fields within Movieinfos do not adequately sanitize input, while for photos, the Photo Title and Photo Tags fields are similarly vulnerable. An attacker with permissions to edit video or photo metadata can inject malicious JavaScript code by inserting crafted input, such as closing delimiters followed by script elements. When any user, including unauthenticated visitors or administrators, views the affected video or photo page, the injected script executes in their browser context. Although cookies are set with the HttpOnly attribute, preventing direct cookie theft via JavaScript, the malicious script can issue fetch requests to sensitive endpoints like admin_area pages. This can lead to unauthorized data exfiltration or unintended administrative actions. The vulnerability does not require prior authentication to exploit the script execution, but the attacker must have editing rights on the media content. The CVSS 3.1 base score is 5.4, reflecting medium severity, with an attack vector of network, low attack complexity, no privileges required for script execution, but user interaction is necessary (viewing the page). The vulnerability affects confidentiality and integrity but not availability. The issue was publicly disclosed on October 17, 2025, and fixed in build 5.5.2 #146. No known workarounds exist, making patching the only effective mitigation.
Potential Impact
For European organizations using ClipBucket v5 in versions prior to build 5.5.2 #146, this vulnerability poses a significant risk to the confidentiality and integrity of their web applications. Attackers with editing permissions can inject malicious scripts that execute in the browsers of site visitors, including administrators, potentially leading to unauthorized data access or manipulation. This can result in leakage of sensitive administrative data, unauthorized changes to content or settings, and erosion of user trust. Since the vulnerability affects publicly accessible video and photo pages, it can be exploited by unauthenticated users if they can gain editing rights, for example via compromised accounts or weak access controls. The impact is heightened in organizations that rely on ClipBucket for media sharing with sensitive or proprietary content. While availability is not directly affected, the reputational damage and potential regulatory consequences under GDPR for data breaches could be substantial. The medium CVSS score reflects moderate risk, but the ease of exploitation by insiders or compromised users increases the threat level. European entities operating media platforms or community sites using ClipBucket should consider this vulnerability a priority for remediation to prevent exploitation.
Mitigation Recommendations
The primary mitigation is to upgrade ClipBucket v5 installations to build 5.5.2 #146 or later, where the vulnerability has been fixed. Since no known workarounds exist, patching is critical. Additionally, organizations should enforce strict access controls to limit who can edit video and photo metadata, reducing the risk of malicious input injection. Implementing web application firewalls (WAFs) with rules to detect and block common XSS payloads in metadata fields can provide temporary protection. Regularly audit user permissions and monitor logs for unusual editing activity. Employ Content Security Policy (CSP) headers to restrict script execution sources, mitigating the impact of injected scripts. Conduct security awareness training for administrators and content editors to recognize suspicious behavior. Finally, perform periodic vulnerability scanning and penetration testing on ClipBucket deployments to detect similar injection flaws proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-13T16:26:12.181Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f284899c34d0947f39a008
Added to database: 10/17/2025, 6:01:45 PM
Last enriched: 10/24/2025, 6:22:14 PM
Last updated: 12/3/2025, 11:53:44 AM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Penn and Phoenix Universities Disclose Data Breach After Oracle Hack
MediumChopping AI Down to Size: Turning Disruptive Technology into a Strategic Advantage
MediumCVE-2025-13947: Vulnerability in Red Hat Red Hat Enterprise Linux 6
HighCVE-2025-13472: CWE-862 Missing Authorization in Perforce BlazeMeter
MediumCVE-2025-12744: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.