Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26005: CWE-918: Server-Side Request Forgery (SSRF) in MacWarrior clipbucket-v5

0
Medium
VulnerabilityCVE-2026-26005cvecve-2026-26005cwe-918
Published: Thu Feb 12 2026 (02/12/2026, 20:34:01 UTC)
Source: CVE Database V5
Vendor/Project: MacWarrior
Product: clipbucket-v5

Description

ClipBucket v5 is an open source video sharing platform. Prior to 5.5.3 - #45, in Clip Bucket V5, The Remote Play allows creating video entries that reference external video URLs without uploading the video files to the server. However, by specifying an internal network host in the video URL, an SSRF can be triggered, causing GET requests to be sent to internal servers. An attacker can exploit this to scan the internal network. Even a regular (non-privileged) user can carry out the attack.

AI-Powered Analysis

AILast updated: 02/12/2026, 21:03:31 UTC

Technical Analysis

CVE-2026-26005 is a Server-Side Request Forgery (SSRF) vulnerability identified in MacWarrior's ClipBucket v5, an open-source video sharing platform widely used for hosting and sharing video content. The vulnerability exists in versions prior to 5.5.3 - #45, specifically in the Remote Play feature that allows users to create video entries referencing external video URLs without uploading the actual video files to the server. An attacker can exploit this feature by specifying URLs that point to internal network hosts, causing the server to send unauthorized HTTP GET requests to these internal resources. This SSRF flaw enables attackers, even those with non-privileged user accounts, to perform internal network reconnaissance by scanning internal IP addresses and services that are otherwise inaccessible externally. The vulnerability affects confidentiality by potentially exposing internal network structure and services but does not directly impact data integrity or system availability. The CVSS 3.1 base score is 5.0 (medium severity), reflecting the network attack vector, low complexity, requirement for low privileges, no user interaction, and partial confidentiality impact. No known exploits have been reported in the wild, but the vulnerability poses a risk especially in environments where ClipBucket is deployed without adequate network segmentation or access controls. The lack of a patch link suggests that users should upgrade to version 5.5.3 or later once available or apply vendor-recommended mitigations. This vulnerability highlights the risks of SSRF in web applications that fetch external resources without proper validation or filtering.

Potential Impact

For European organizations, the SSRF vulnerability in ClipBucket v5 could lead to unauthorized internal network reconnaissance, exposing sensitive infrastructure details such as internal IP addresses, services, and potentially vulnerable internal applications. This exposure can facilitate subsequent targeted attacks, lateral movement, or data exfiltration attempts. Organizations in sectors relying on video sharing platforms—such as media companies, educational institutions, and public sector entities—may be particularly at risk if they use vulnerable versions of ClipBucket. The vulnerability's exploitation by non-privileged users increases the attack surface, especially in multi-tenant or public-facing environments. While the direct impact on data integrity and availability is low, the confidentiality breach could have regulatory implications under GDPR if internal network information leads to further compromise of personal data. Additionally, the SSRF could be leveraged as a stepping stone in complex attack chains, increasing overall risk. European organizations with insufficient network segmentation or weak internal access controls are more vulnerable to exploitation.

Mitigation Recommendations

To mitigate CVE-2026-26005, European organizations should immediately upgrade ClipBucket installations to version 5.5.3 or later once available, as this version addresses the SSRF vulnerability. Until patching is possible, implement strict input validation and sanitization on URLs accepted by the Remote Play feature to block internal IP ranges (e.g., RFC1918 addresses) and localhost references. Employ web application firewalls (WAFs) with custom rules to detect and block SSRF patterns targeting internal resources. Network segmentation should be enforced to isolate the ClipBucket server from sensitive internal systems, limiting the impact of SSRF exploitation. Monitor server logs for unusual outbound HTTP requests initiated by the application, which may indicate exploitation attempts. Restrict user privileges to the minimum necessary and consider disabling the Remote Play feature if not required. Conduct internal penetration testing to identify and remediate similar SSRF risks. Finally, raise user awareness about the risks of submitting untrusted URLs and maintain an incident response plan to address potential SSRF exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-09T17:41:55.860Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698e3cc8c9e1ff5ad81239fa

Added to database: 2/12/2026, 8:49:12 PM

Last enriched: 2/12/2026, 9:03:31 PM

Last updated: 2/12/2026, 10:42:15 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats