Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64336: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MacWarrior clipbucket-v5

0
High
VulnerabilityCVE-2025-64336cvecve-2025-64336cwe-79cwe-269
Published: Fri Nov 07 2025 (11/07/2025, 04:32:10 UTC)
Source: CVE Database V5
Vendor/Project: MacWarrior
Product: clipbucket-v5

Description

ClipBucket v5 is an open source video sharing platform. In versions 5.5.2-#146 and below, the Manage Photos feature is vulnerable to stored Cross-site Scripting (XSS). An authenticated regular user can upload a photo with a malicious Photo Title containing HTML/JavaScript code. While the payload does not execute in the user-facing photo gallery or detail pages, it is rendered unsafely in the Admin → Manage Photos section, resulting in JavaScript execution in the administrator’s browser. This issue is fixed in version 5.5.2-#147.

AI-Powered Analysis

AILast updated: 11/07/2025, 04:47:47 UTC

Technical Analysis

CVE-2025-64336 is a stored Cross-site Scripting (XSS) vulnerability affecting ClipBucket v5 versions up to 5.5.2-#146. ClipBucket is an open source platform for video sharing, widely used for hosting and managing multimedia content. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), specifically in the Manage Photos feature. Authenticated regular users can upload photos with maliciously crafted Photo Titles containing embedded HTML or JavaScript code. While the malicious script does not execute in the public-facing photo gallery or detail pages, it is rendered unsafely in the administrative interface under Admin → Manage Photos. This results in the execution of arbitrary JavaScript in the context of the administrator’s browser session. The attack vector requires the attacker to have a valid user account and to upload a photo with the malicious payload. Once the administrator accesses the Manage Photos page, the script executes, potentially allowing session hijacking, privilege escalation, or other malicious actions such as unauthorized administrative commands. The vulnerability does not require elevated privileges beyond a regular user account but does require some user interaction (administrator visiting the vulnerable page). The CVSS 4.0 base score is 7.2 (high), reflecting network attack vector, low attack complexity, no privileges required, partial user interaction, and high impact on confidentiality and integrity. The vulnerability was reserved on 2025-10-30 and published on 2025-11-07. No known exploits in the wild have been reported. The issue is resolved in ClipBucket version 5.5.2-#147. This vulnerability also relates to CWE-269 (Improper Privilege Management) due to the impact on administrative functions. The root cause is insufficient input sanitization and output encoding in the admin interface, allowing stored XSS payloads to execute.

Potential Impact

For European organizations using ClipBucket v5, particularly versions prior to 5.5.2-#147, this vulnerability poses a significant risk to administrative account security and overall platform integrity. Successful exploitation can lead to administrator session hijacking, enabling attackers to gain control over the video sharing platform’s backend. This can result in unauthorized content manipulation, data theft, insertion of malicious content, or disruption of services. Given that the attack requires an authenticated user account, organizations with open or weak user registration controls are at higher risk. The impact on confidentiality and integrity is high, as attackers can access sensitive administrative functions and data. Availability impact is lower but possible if attackers disrupt administrative operations. European organizations hosting user-generated video content, educational platforms, media companies, or internal collaboration tools using ClipBucket are particularly vulnerable. The threat is exacerbated if administrative access is not tightly controlled or if administrators are not trained to recognize suspicious activity. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as proof-of-concept code could emerge. The vulnerability could be leveraged in targeted attacks against high-value European entities relying on ClipBucket for content management.

Mitigation Recommendations

1. Immediate upgrade to ClipBucket version 5.5.2-#147 or later, where the vulnerability is patched. 2. Restrict access to the Admin → Manage Photos interface using network-level controls such as VPNs, IP whitelisting, or multi-factor authentication to reduce exposure. 3. Implement strict user registration and verification processes to prevent malicious users from obtaining authenticated accounts. 4. Employ Content Security Policy (CSP) headers to limit the impact of potential XSS payloads in the admin interface. 5. Conduct regular security training for administrators to recognize and report suspicious behavior or unexpected interface content. 6. Monitor logs for unusual photo uploads or administrative access patterns that could indicate exploitation attempts. 7. If immediate patching is not possible, consider temporarily disabling the Manage Photos feature or limiting photo title input length and sanitizing inputs at the web server or application firewall level. 8. Review and enhance input validation and output encoding practices in custom deployments or forks of ClipBucket. 9. Use web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting the admin interface. 10. Regularly audit user privileges to ensure least privilege principles are enforced.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-30T17:40:52.030Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690d79bf3ea13e495ec0cafb

Added to database: 11/7/2025, 4:46:55 AM

Last enriched: 11/7/2025, 4:47:47 AM

Last updated: 11/7/2025, 7:01:35 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats