CVE-2026-26005: CWE-918: Server-Side Request Forgery (SSRF) in MacWarrior clipbucket-v5
ClipBucket v5 is an open source video sharing platform. Prior to 5.5.3 - #45, in Clip Bucket V5, The Remote Play allows creating video entries that reference external video URLs without uploading the video files to the server. However, by specifying an internal network host in the video URL, an SSRF can be triggered, causing GET requests to be sent to internal servers. An attacker can exploit this to scan the internal network. Even a regular (non-privileged) user can carry out the attack.
AI Analysis
Technical Summary
CVE-2026-26005 is a Server-Side Request Forgery (SSRF) vulnerability identified in MacWarrior's ClipBucket v5, an open-source video sharing platform widely used for hosting and sharing video content. The vulnerability exists in versions prior to 5.5.3 - #45, specifically in the Remote Play feature that allows users to create video entries referencing external video URLs without uploading the actual video files to the server. An attacker can exploit this feature by specifying URLs that point to internal network hosts, causing the server to send unauthorized HTTP GET requests to these internal resources. This SSRF flaw enables attackers, even those with non-privileged user accounts, to perform internal network reconnaissance by scanning internal IP addresses and services that are otherwise inaccessible externally. The vulnerability affects confidentiality by potentially exposing internal network structure and services but does not directly impact data integrity or system availability. The CVSS 3.1 base score is 5.0 (medium severity), reflecting the network attack vector, low complexity, requirement for low privileges, no user interaction, and partial confidentiality impact. No known exploits have been reported in the wild, but the vulnerability poses a risk especially in environments where ClipBucket is deployed without adequate network segmentation or access controls. The lack of a patch link suggests that users should upgrade to version 5.5.3 or later once available or apply vendor-recommended mitigations. This vulnerability highlights the risks of SSRF in web applications that fetch external resources without proper validation or filtering.
Potential Impact
For European organizations, the SSRF vulnerability in ClipBucket v5 could lead to unauthorized internal network reconnaissance, exposing sensitive infrastructure details such as internal IP addresses, services, and potentially vulnerable internal applications. This exposure can facilitate subsequent targeted attacks, lateral movement, or data exfiltration attempts. Organizations in sectors relying on video sharing platforms—such as media companies, educational institutions, and public sector entities—may be particularly at risk if they use vulnerable versions of ClipBucket. The vulnerability's exploitation by non-privileged users increases the attack surface, especially in multi-tenant or public-facing environments. While the direct impact on data integrity and availability is low, the confidentiality breach could have regulatory implications under GDPR if internal network information leads to further compromise of personal data. Additionally, the SSRF could be leveraged as a stepping stone in complex attack chains, increasing overall risk. European organizations with insufficient network segmentation or weak internal access controls are more vulnerable to exploitation.
Mitigation Recommendations
To mitigate CVE-2026-26005, European organizations should immediately upgrade ClipBucket installations to version 5.5.3 or later once available, as this version addresses the SSRF vulnerability. Until patching is possible, implement strict input validation and sanitization on URLs accepted by the Remote Play feature to block internal IP ranges (e.g., RFC1918 addresses) and localhost references. Employ web application firewalls (WAFs) with custom rules to detect and block SSRF patterns targeting internal resources. Network segmentation should be enforced to isolate the ClipBucket server from sensitive internal systems, limiting the impact of SSRF exploitation. Monitor server logs for unusual outbound HTTP requests initiated by the application, which may indicate exploitation attempts. Restrict user privileges to the minimum necessary and consider disabling the Remote Play feature if not required. Conduct internal penetration testing to identify and remediate similar SSRF risks. Finally, raise user awareness about the risks of submitting untrusted URLs and maintain an incident response plan to address potential SSRF exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2026-26005: CWE-918: Server-Side Request Forgery (SSRF) in MacWarrior clipbucket-v5
Description
ClipBucket v5 is an open source video sharing platform. Prior to 5.5.3 - #45, in Clip Bucket V5, The Remote Play allows creating video entries that reference external video URLs without uploading the video files to the server. However, by specifying an internal network host in the video URL, an SSRF can be triggered, causing GET requests to be sent to internal servers. An attacker can exploit this to scan the internal network. Even a regular (non-privileged) user can carry out the attack.
AI-Powered Analysis
Technical Analysis
CVE-2026-26005 is a Server-Side Request Forgery (SSRF) vulnerability identified in MacWarrior's ClipBucket v5, an open-source video sharing platform widely used for hosting and sharing video content. The vulnerability exists in versions prior to 5.5.3 - #45, specifically in the Remote Play feature that allows users to create video entries referencing external video URLs without uploading the actual video files to the server. An attacker can exploit this feature by specifying URLs that point to internal network hosts, causing the server to send unauthorized HTTP GET requests to these internal resources. This SSRF flaw enables attackers, even those with non-privileged user accounts, to perform internal network reconnaissance by scanning internal IP addresses and services that are otherwise inaccessible externally. The vulnerability affects confidentiality by potentially exposing internal network structure and services but does not directly impact data integrity or system availability. The CVSS 3.1 base score is 5.0 (medium severity), reflecting the network attack vector, low complexity, requirement for low privileges, no user interaction, and partial confidentiality impact. No known exploits have been reported in the wild, but the vulnerability poses a risk especially in environments where ClipBucket is deployed without adequate network segmentation or access controls. The lack of a patch link suggests that users should upgrade to version 5.5.3 or later once available or apply vendor-recommended mitigations. This vulnerability highlights the risks of SSRF in web applications that fetch external resources without proper validation or filtering.
Potential Impact
For European organizations, the SSRF vulnerability in ClipBucket v5 could lead to unauthorized internal network reconnaissance, exposing sensitive infrastructure details such as internal IP addresses, services, and potentially vulnerable internal applications. This exposure can facilitate subsequent targeted attacks, lateral movement, or data exfiltration attempts. Organizations in sectors relying on video sharing platforms—such as media companies, educational institutions, and public sector entities—may be particularly at risk if they use vulnerable versions of ClipBucket. The vulnerability's exploitation by non-privileged users increases the attack surface, especially in multi-tenant or public-facing environments. While the direct impact on data integrity and availability is low, the confidentiality breach could have regulatory implications under GDPR if internal network information leads to further compromise of personal data. Additionally, the SSRF could be leveraged as a stepping stone in complex attack chains, increasing overall risk. European organizations with insufficient network segmentation or weak internal access controls are more vulnerable to exploitation.
Mitigation Recommendations
To mitigate CVE-2026-26005, European organizations should immediately upgrade ClipBucket installations to version 5.5.3 or later once available, as this version addresses the SSRF vulnerability. Until patching is possible, implement strict input validation and sanitization on URLs accepted by the Remote Play feature to block internal IP ranges (e.g., RFC1918 addresses) and localhost references. Employ web application firewalls (WAFs) with custom rules to detect and block SSRF patterns targeting internal resources. Network segmentation should be enforced to isolate the ClipBucket server from sensitive internal systems, limiting the impact of SSRF exploitation. Monitor server logs for unusual outbound HTTP requests initiated by the application, which may indicate exploitation attempts. Restrict user privileges to the minimum necessary and consider disabling the Remote Play feature if not required. Conduct internal penetration testing to identify and remediate similar SSRF risks. Finally, raise user awareness about the risks of submitting untrusted URLs and maintain an incident response plan to address potential SSRF exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-09T17:41:55.860Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698e3cc8c9e1ff5ad81239fa
Added to database: 2/12/2026, 8:49:12 PM
Last enriched: 2/12/2026, 9:03:31 PM
Last updated: 2/12/2026, 10:42:15 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-70092: n/a
UnknownCVE-2026-26055: CWE-306: Missing Authentication for Critical Function in yokecd yoke
HighCVE-2026-26076: CWE-770: Allocation of Resources Without Limits or Throttling in pendulum-project ntpd-rs
MediumCVE-2026-26075: CWE-352: Cross-Site Request Forgery (CSRF) in labring FastGPT
MediumCVE-2025-70845: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.