Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21875: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in MacWarrior clipbucket-v5

0
Critical
VulnerabilityCVE-2026-21875cvecve-2026-21875cwe-89
Published: Wed Jan 07 2026 (01/07/2026, 23:52:18 UTC)
Source: CVE Database V5
Vendor/Project: MacWarrior
Product: clipbucket-v5

Description

ClipBucket v5 is an open source video sharing platform. Versions 5.5.2-#187 and below allow an attacker to perform Blind SQL Injection through the add comment section within a channel. When adding a comment within a channel, there is a POST request to the /actions/ajax.php endpoint. The obj_id parameter within the POST request to /actions/ajax.php is then used within the user_exists function of the upload/includes/classes/user.class. php file as the $id parameter. It is then used within the count function of the upload/includes/classes/db.class. php file. The $id parameter is concatenated into the query without validation or sanitization, and a user-supplied input like 1' or 1=1-- - can be used to trigger the injection. This issue does not have a fix at the time of publication.

AI-Powered Analysis

AILast updated: 01/08/2026, 00:09:40 UTC

Technical Analysis

CVE-2026-21875 is a critical SQL Injection vulnerability identified in MacWarrior's ClipBucket v5, an open-source video sharing platform. The flaw exists in versions 5.5.2-#187 and earlier, specifically in the add comment functionality within a channel. When a user submits a comment, a POST request is sent to the /actions/ajax.php endpoint with an obj_id parameter. This parameter is passed to the user_exists function in upload/includes/classes/user.class.php as the $id argument, which is then used in the count function within upload/includes/classes/db.class.php. The $id parameter is directly concatenated into an SQL query without any validation or sanitization, allowing an attacker to inject SQL code. An example payload such as 1' or 1=1-- - can manipulate the query logic, enabling Blind SQL Injection attacks. This can lead to unauthorized data disclosure, data modification, or deletion, compromising the confidentiality, integrity, and availability of the backend database. The vulnerability requires no authentication or user interaction, making it highly exploitable remotely. Despite its criticality and a CVSS score of 9.8, no official patch or fix has been released at the time of disclosure. No known exploits have been observed in the wild yet, but the potential for exploitation is significant given the ease of attack and the sensitive nature of data handled by video sharing platforms.

Potential Impact

For European organizations, this vulnerability poses a severe risk, particularly for those deploying ClipBucket v5 as part of their video sharing or content management infrastructure. Exploitation could lead to unauthorized access to user data, including personally identifiable information, comments, and potentially administrative credentials if stored in the database. Data integrity could be compromised by unauthorized modifications or deletions, disrupting service availability and damaging organizational reputation. Educational institutions, media companies, and public sector entities using ClipBucket may face data breaches or service outages. The lack of authentication requirements and the remote exploitability increase the threat level, potentially enabling attackers to leverage this vulnerability for broader network intrusion or lateral movement. Additionally, regulatory compliance risks under GDPR arise from potential data leaks. The absence of a patch increases the urgency for organizations to implement compensating controls to mitigate exposure.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls: 1) Restrict access to the /actions/ajax.php endpoint using web application firewalls (WAFs) with rules to detect and block SQL injection patterns, especially targeting the obj_id parameter. 2) Employ input validation and sanitization at the application or proxy level to reject suspicious inputs containing SQL syntax. 3) Monitor application logs and database queries for anomalous activity indicative of injection attempts. 4) Limit database user privileges to the minimum necessary to reduce impact if exploited. 5) Consider temporarily disabling or restricting the add comment feature on channels until a fix is available. 6) Isolate the ClipBucket server within a segmented network zone to limit lateral movement. 7) Prepare incident response plans for potential exploitation scenarios. 8) Engage with the vendor or open-source community for updates or unofficial patches. 9) Conduct regular security assessments and penetration tests focusing on injection vulnerabilities. These steps will help reduce the attack surface and detect exploitation attempts while awaiting an official fix.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-05T16:44:16.369Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695ef26a07b8a419a77247a4

Added to database: 1/7/2026, 11:55:22 PM

Last enriched: 1/8/2026, 12:09:40 AM

Last updated: 1/9/2026, 12:01:25 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats