Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32321: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in MacWarrior clipbucket-v5

0
High
VulnerabilityCVE-2026-32321cvecve-2026-32321cwe-89
Published: Wed Mar 18 2026 (03/18/2026, 20:37:51 UTC)
Source: CVE Database V5
Vendor/Project: MacWarrior
Product: clipbucket-v5

Description

CVE-2026-32321 is a high-severity SQL injection vulnerability affecting ClipBucket v5 versions prior to 5. 5. 3 #80. It exists in the actions/ajax. php endpoint due to improper sanitization of the userid parameter, allowing an authenticated attacker to perform time-based blind SQL injection. Exploitation can lead to full database disclosure and potential administrative account takeover without requiring user interaction. The vulnerability has a CVSS score of 8. 8, reflecting its critical impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, organizations using vulnerable versions should urgently apply the patch in version 5. 5.

AI-Powered Analysis

AILast updated: 03/18/2026, 21:12:36 UTC

Technical Analysis

CVE-2026-32321 is a time-based blind SQL injection vulnerability in ClipBucket v5, an open-source video sharing platform. The flaw exists in the actions/ajax.php endpoint where the userid parameter is not properly sanitized before being used in SQL queries. Because the vulnerability requires authentication but no user interaction, an attacker with valid credentials can inject arbitrary SQL commands. This can lead to full disclosure of the database contents, including sensitive user data and administrative credentials, enabling account takeover and further system compromise. The vulnerability affects all versions prior to 5.5.3 #80, which contains the patch. The CVSS 3.1 score of 8.8 indicates a high severity with network attack vector, low attack complexity, and high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability's characteristics make it a critical risk for organizations using ClipBucket for video sharing services. The root cause is improper neutralization of special elements in SQL commands (CWE-89), highlighting the need for secure coding practices such as parameterized queries and input validation. The vulnerability was reserved on March 11, 2026, and published on March 18, 2026.

Potential Impact

The impact of CVE-2026-32321 is significant for organizations running vulnerable versions of ClipBucket. Successful exploitation can lead to full disclosure of the backend database, exposing sensitive user information, including personally identifiable information (PII), authentication credentials, and potentially payment or administrative data. This can result in unauthorized administrative access, allowing attackers to modify or delete content, disrupt service availability, or pivot to other internal systems. The compromise of administrative accounts can lead to persistent backdoors and further exploitation. For video sharing platforms, this can damage user trust, lead to regulatory penalties due to data breaches, and cause reputational harm. The network-exploitable nature and lack of required user interaction increase the likelihood of targeted attacks, especially in environments where ClipBucket is used for public-facing services.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade ClipBucket to version 5.5.3 #80 or later, where the issue is fixed. In addition to patching, developers and administrators should audit all input handling in the application, especially parameters used in SQL queries, to ensure proper sanitization and use of parameterized queries or prepared statements. Implementing Web Application Firewalls (WAFs) with rules to detect and block SQL injection patterns can provide temporary protection. Regularly review authentication mechanisms to limit the number of users with elevated privileges and monitor logs for suspicious query patterns or unusual database access. Conduct security code reviews and penetration testing focused on injection flaws. Finally, maintain timely patch management processes and monitor threat intelligence feeds for any emerging exploit activity related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-11T21:16:21.661Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bb11f2771bdb1749c4fa39

Added to database: 3/18/2026, 8:58:26 PM

Last enriched: 3/18/2026, 9:12:36 PM

Last updated: 3/18/2026, 9:59:47 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses