CVE-2025-64338

9.0 CRITICAL

📋 TL;DR

ClipBucket v5 versions 5.5.2-#156 and below contain a stored cross-site scripting (XSS) vulnerability in the photo collection name field. Authenticated regular users can inject malicious scripts that execute in administrators' browsers when viewing the Manage Photos interface, potentially allowing privilege escalation. This affects all ClipBucket v5 installations running vulnerable versions.

💻 Affected Systems

Products:
  • ClipBucket v5
Versions: 5.5.2-#156 and below
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated regular user access; administrators viewing the Manage Photos interface are the primary targets.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full administrative control over the ClipBucket instance, potentially compromising the entire server through subsequent attacks, stealing sensitive data, or defacing the platform.

🟠

Likely Case

Attackers steal administrator session cookies or credentials, perform unauthorized administrative actions, or deploy additional malicious payloads to compromise user accounts.

🟢

If Mitigated

With proper input validation and output encoding, the payload would be rendered as harmless text rather than executable code, preventing the attack entirely.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user access but is straightforward once obtained; the vulnerability is well-documented in the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.5.2-#157

Vendor Advisory: https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-93rh-fxxx-j38j

Restart Required: No

Instructions:

1. Backup your ClipBucket installation and database. 2. Update to version 5.5.2-#157 or later via the GitHub repository. 3. Verify the fix by checking that HTML/JavaScript in collection names is properly sanitized.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to strip or escape HTML/JavaScript from collection name fields before storage.

Modify relevant PHP files to apply htmlspecialchars() or similar sanitization to collection name inputs

Output Encoding

all

Apply proper output encoding when rendering collection names in the Manage Photos interface to prevent script execution.

Update template files to use appropriate escaping functions like htmlentities() when displaying collection names

🧯 If You Can't Patch

  • Restrict regular user account creation and monitor existing accounts for suspicious activity.
  • Implement a web application firewall (WAF) with XSS protection rules to block malicious payloads.

🔍 How to Verify

Check if Vulnerable:

Test by creating a photo collection with a name containing <script>alert('XSS')</script> and check if it executes when an administrator views Manage Photos.

Check Version:

Check the version in ClipBucket's admin panel or review the codebase for commit 8e3cf79ce2721fbebde68a05a9a1a6319f086bcc.

Verify Fix Applied:

After patching, attempt the same test; the script should appear as plain text rather than executing.

📡 Detection & Monitoring

Log Indicators:

  • Unusual collection name entries containing script tags or JavaScript code in database logs
  • Multiple failed login attempts followed by collection creation

Network Indicators:

  • HTTP requests with suspicious payloads in POST parameters for collection creation

SIEM Query:

source="web_logs" AND (uri_path="/ajax/create_collection" OR uri_path="/manage_photos") AND (request_body LIKE "%<script>%" OR request_body LIKE "%javascript:%")

🔗 References

📤 Share & Export