CVE-2025-64336: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MacWarrior clipbucket-v5
ClipBucket v5 is an open source video sharing platform. In versions 5.5.2-#146 and below, the Manage Photos feature is vulnerable to stored Cross-site Scripting (XSS). An authenticated regular user can upload a photo with a malicious Photo Title containing HTML/JavaScript code. While the payload does not execute in the user-facing photo gallery or detail pages, it is rendered unsafely in the Admin → Manage Photos section, resulting in JavaScript execution in the administrator’s browser. This issue is fixed in version 5.5.2-#147.
AI Analysis
Technical Summary
CVE-2025-64336 is a stored Cross-site Scripting (XSS) vulnerability affecting ClipBucket v5 versions up to 5.5.2-#146. ClipBucket is an open source platform for video sharing, widely used for hosting and managing multimedia content. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), specifically in the Manage Photos feature. Authenticated regular users can upload photos with maliciously crafted Photo Titles containing embedded HTML or JavaScript code. While the malicious script does not execute in the public-facing photo gallery or detail pages, it is rendered unsafely in the administrative interface under Admin → Manage Photos. This results in the execution of arbitrary JavaScript in the context of the administrator’s browser session. The attack vector requires the attacker to have a valid user account and to upload a photo with the malicious payload. Once the administrator accesses the Manage Photos page, the script executes, potentially allowing session hijacking, privilege escalation, or other malicious actions such as unauthorized administrative commands. The vulnerability does not require elevated privileges beyond a regular user account but does require some user interaction (administrator visiting the vulnerable page). The CVSS 4.0 base score is 7.2 (high), reflecting network attack vector, low attack complexity, no privileges required, partial user interaction, and high impact on confidentiality and integrity. The vulnerability was reserved on 2025-10-30 and published on 2025-11-07. No known exploits in the wild have been reported. The issue is resolved in ClipBucket version 5.5.2-#147. This vulnerability also relates to CWE-269 (Improper Privilege Management) due to the impact on administrative functions. The root cause is insufficient input sanitization and output encoding in the admin interface, allowing stored XSS payloads to execute.
Potential Impact
For European organizations using ClipBucket v5, particularly versions prior to 5.5.2-#147, this vulnerability poses a significant risk to administrative account security and overall platform integrity. Successful exploitation can lead to administrator session hijacking, enabling attackers to gain control over the video sharing platform’s backend. This can result in unauthorized content manipulation, data theft, insertion of malicious content, or disruption of services. Given that the attack requires an authenticated user account, organizations with open or weak user registration controls are at higher risk. The impact on confidentiality and integrity is high, as attackers can access sensitive administrative functions and data. Availability impact is lower but possible if attackers disrupt administrative operations. European organizations hosting user-generated video content, educational platforms, media companies, or internal collaboration tools using ClipBucket are particularly vulnerable. The threat is exacerbated if administrative access is not tightly controlled or if administrators are not trained to recognize suspicious activity. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as proof-of-concept code could emerge. The vulnerability could be leveraged in targeted attacks against high-value European entities relying on ClipBucket for content management.
Mitigation Recommendations
1. Immediate upgrade to ClipBucket version 5.5.2-#147 or later, where the vulnerability is patched. 2. Restrict access to the Admin → Manage Photos interface using network-level controls such as VPNs, IP whitelisting, or multi-factor authentication to reduce exposure. 3. Implement strict user registration and verification processes to prevent malicious users from obtaining authenticated accounts. 4. Employ Content Security Policy (CSP) headers to limit the impact of potential XSS payloads in the admin interface. 5. Conduct regular security training for administrators to recognize and report suspicious behavior or unexpected interface content. 6. Monitor logs for unusual photo uploads or administrative access patterns that could indicate exploitation attempts. 7. If immediate patching is not possible, consider temporarily disabling the Manage Photos feature or limiting photo title input length and sanitizing inputs at the web server or application firewall level. 8. Review and enhance input validation and output encoding practices in custom deployments or forks of ClipBucket. 9. Use web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting the admin interface. 10. Regularly audit user privileges to ensure least privilege principles are enforced.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2025-64336: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MacWarrior clipbucket-v5
Description
ClipBucket v5 is an open source video sharing platform. In versions 5.5.2-#146 and below, the Manage Photos feature is vulnerable to stored Cross-site Scripting (XSS). An authenticated regular user can upload a photo with a malicious Photo Title containing HTML/JavaScript code. While the payload does not execute in the user-facing photo gallery or detail pages, it is rendered unsafely in the Admin → Manage Photos section, resulting in JavaScript execution in the administrator’s browser. This issue is fixed in version 5.5.2-#147.
AI-Powered Analysis
Technical Analysis
CVE-2025-64336 is a stored Cross-site Scripting (XSS) vulnerability affecting ClipBucket v5 versions up to 5.5.2-#146. ClipBucket is an open source platform for video sharing, widely used for hosting and managing multimedia content. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), specifically in the Manage Photos feature. Authenticated regular users can upload photos with maliciously crafted Photo Titles containing embedded HTML or JavaScript code. While the malicious script does not execute in the public-facing photo gallery or detail pages, it is rendered unsafely in the administrative interface under Admin → Manage Photos. This results in the execution of arbitrary JavaScript in the context of the administrator’s browser session. The attack vector requires the attacker to have a valid user account and to upload a photo with the malicious payload. Once the administrator accesses the Manage Photos page, the script executes, potentially allowing session hijacking, privilege escalation, or other malicious actions such as unauthorized administrative commands. The vulnerability does not require elevated privileges beyond a regular user account but does require some user interaction (administrator visiting the vulnerable page). The CVSS 4.0 base score is 7.2 (high), reflecting network attack vector, low attack complexity, no privileges required, partial user interaction, and high impact on confidentiality and integrity. The vulnerability was reserved on 2025-10-30 and published on 2025-11-07. No known exploits in the wild have been reported. The issue is resolved in ClipBucket version 5.5.2-#147. This vulnerability also relates to CWE-269 (Improper Privilege Management) due to the impact on administrative functions. The root cause is insufficient input sanitization and output encoding in the admin interface, allowing stored XSS payloads to execute.
Potential Impact
For European organizations using ClipBucket v5, particularly versions prior to 5.5.2-#147, this vulnerability poses a significant risk to administrative account security and overall platform integrity. Successful exploitation can lead to administrator session hijacking, enabling attackers to gain control over the video sharing platform’s backend. This can result in unauthorized content manipulation, data theft, insertion of malicious content, or disruption of services. Given that the attack requires an authenticated user account, organizations with open or weak user registration controls are at higher risk. The impact on confidentiality and integrity is high, as attackers can access sensitive administrative functions and data. Availability impact is lower but possible if attackers disrupt administrative operations. European organizations hosting user-generated video content, educational platforms, media companies, or internal collaboration tools using ClipBucket are particularly vulnerable. The threat is exacerbated if administrative access is not tightly controlled or if administrators are not trained to recognize suspicious activity. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as proof-of-concept code could emerge. The vulnerability could be leveraged in targeted attacks against high-value European entities relying on ClipBucket for content management.
Mitigation Recommendations
1. Immediate upgrade to ClipBucket version 5.5.2-#147 or later, where the vulnerability is patched. 2. Restrict access to the Admin → Manage Photos interface using network-level controls such as VPNs, IP whitelisting, or multi-factor authentication to reduce exposure. 3. Implement strict user registration and verification processes to prevent malicious users from obtaining authenticated accounts. 4. Employ Content Security Policy (CSP) headers to limit the impact of potential XSS payloads in the admin interface. 5. Conduct regular security training for administrators to recognize and report suspicious behavior or unexpected interface content. 6. Monitor logs for unusual photo uploads or administrative access patterns that could indicate exploitation attempts. 7. If immediate patching is not possible, consider temporarily disabling the Manage Photos feature or limiting photo title input length and sanitizing inputs at the web server or application firewall level. 8. Review and enhance input validation and output encoding practices in custom deployments or forks of ClipBucket. 9. Use web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting the admin interface. 10. Regularly audit user privileges to ensure least privilege principles are enforced.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-30T17:40:52.030Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 690d79bf3ea13e495ec0cafb
Added to database: 11/7/2025, 4:46:55 AM
Last enriched: 11/7/2025, 4:47:47 AM
Last updated: 11/7/2025, 7:01:35 PM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12890: Improper Check or Handling of Exceptional Conditions in zephyrproject-rtos Zephyr
MediumCVE-2025-36185: CWE-943 Improper Neutralization of Special Elements in Data Query Logic in IBM Db2
MediumCVE-2025-36136: CWE-770 Allocation of Resources Without Limits or Throttling in IBM Db2
MediumCVE-2025-36131: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in IBM Db2
MediumCVE-2025-36186: CWE-250 Execution with Unnecessary Privileges in IBM Db2
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.