Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21875: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in MacWarrior clipbucket-v5

0
Critical
VulnerabilityCVE-2026-21875cvecve-2026-21875cwe-89
Published: Wed Jan 07 2026 (01/07/2026, 23:52:18 UTC)
Source: CVE Database V5
Vendor/Project: MacWarrior
Product: clipbucket-v5

Description

ClipBucket v5 is an open source video sharing platform. Versions 5.5.2-#187 and below allow an attacker to perform Blind SQL Injection through the add comment section within a channel. When adding a comment within a channel, there is a POST request to the /actions/ajax.php endpoint. The obj_id parameter within the POST request to /actions/ajax.php is then used within the user_exists function of the upload/includes/classes/user.class. php file as the $id parameter. It is then used within the count function of the upload/includes/classes/db.class. php file. The $id parameter is concatenated into the query without validation or sanitization, and a user-supplied input like 1' or 1=1-- - can be used to trigger the injection. This issue does not have a fix at the time of publication.

AI-Powered Analysis

AILast updated: 01/15/2026, 04:37:32 UTC

Technical Analysis

CVE-2026-21875 is a critical SQL Injection vulnerability identified in the open-source video sharing platform ClipBucket v5, specifically affecting versions 5.5.2-#187 and earlier. The vulnerability is located in the add comment functionality within channel pages, where a POST request is made to the /actions/ajax.php endpoint. The parameter obj_id from this request is passed as the $id parameter to the user_exists function in upload/includes/classes/user.class.php, which subsequently uses it in the count function of upload/includes/classes/db.class.php. The critical issue is that the $id parameter is concatenated directly into an SQL query string without any validation or sanitization, allowing an attacker to inject malicious SQL code. For example, an input such as 1' or 1=1-- - can manipulate the query logic, enabling blind SQL injection attacks. This can lead to unauthorized data access, data modification, or even full database compromise. The vulnerability requires no authentication or user interaction, making it trivially exploitable remotely. At the time of publication, no official patch or fix is available, increasing the urgency for organizations to apply mitigations. The CVSS v3.1 base score is 9.8, reflecting the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation. Although no known exploits have been observed in the wild, the vulnerability's nature and severity suggest it is a prime target for attackers. The root cause is improper neutralization of special elements in SQL commands (CWE-89), a common but severe coding flaw in web applications handling user input.

Potential Impact

For European organizations, the impact of this vulnerability can be severe, especially for those relying on ClipBucket v5 for video sharing or content management. Exploitation could lead to unauthorized disclosure of sensitive user data, including personal information and potentially intellectual property stored in the database. Attackers could alter or delete data, disrupt service availability, or escalate attacks within the network by leveraging compromised database access. Public-facing ClipBucket instances are particularly vulnerable to automated scanning and exploitation attempts, increasing the risk of widespread compromise. Media companies, educational institutions, and government agencies using ClipBucket could face reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions. The lack of a patch means organizations must rely on compensating controls, increasing operational overhead. Additionally, the vulnerability could be exploited to establish persistent backdoors or pivot to other internal systems, amplifying the threat landscape for European entities.

Mitigation Recommendations

Given the absence of an official patch, European organizations should immediately implement the following mitigations: 1) Apply strict input validation and sanitization on the obj_id parameter and any other user-supplied inputs, rejecting suspicious or malformed data. 2) Modify the source code to use parameterized queries or prepared statements instead of direct string concatenation for SQL commands, eliminating injection vectors. 3) Employ Web Application Firewalls (WAFs) with rules specifically designed to detect and block SQL injection patterns targeting ClipBucket endpoints. 4) Restrict access to the /actions/ajax.php endpoint via network segmentation or IP whitelisting where feasible. 5) Monitor application logs and database query logs for anomalous patterns indicative of injection attempts. 6) Conduct thorough security audits and penetration testing focusing on injection flaws. 7) Prepare incident response plans for potential exploitation scenarios. 8) Engage with the ClipBucket community or vendor for updates or unofficial patches. 9) Consider temporary disabling of the comment feature if it is not critical to operations until a fix is available. 10) Educate developers and administrators on secure coding practices to prevent similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-05T16:44:16.369Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695ef26a07b8a419a77247a4

Added to database: 1/7/2026, 11:55:22 PM

Last enriched: 1/15/2026, 4:37:32 AM

Last updated: 2/7/2026, 4:42:31 AM

Views: 99

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats