CVE-2025-64339

5.4 MEDIUM

📋 TL;DR

ClipBucket v5 has a stored XSS vulnerability in the Manage Playlists feature where authenticated low-privileged users can inject malicious JavaScript into playlist names. This code executes in the browsers of anyone viewing the playlist pages, including administrators. The vulnerability affects versions 5.5.2-#146 and below.

💻 Affected Systems

Products:
  • ClipBucket v5
Versions: 5.5.2-#146 and below
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access (low privilege is sufficient).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, perform account takeover, deface the website, or redirect users to malicious sites.

🟠

Likely Case

Attackers will steal user session cookies and credentials, potentially compromising multiple user accounts.

🟢

If Mitigated

With proper input validation and output encoding, the malicious code would be rendered harmless as text.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple - just creating a playlist with malicious name.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.5.2-#147

Vendor Advisory: https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-c695-m4g4-v3fv

Restart Required: No

Instructions:

1. Backup your current installation
2. Download version 5.5.2-#147 or newer from GitHub
3. Replace affected files with patched versions
4. Clear any cached data

🔧 Temporary Workarounds

Input Validation Filter

all

Add server-side input validation to sanitize playlist names before storage

Modify playlist creation/update functions to escape HTML special characters

Output Encoding

all

Implement proper output encoding in playlist display templates

Ensure all playlist name outputs use HTML entity encoding

🧯 If You Can't Patch

  • Disable playlist creation for low-privileged users
  • Implement WAF rules to block XSS payloads in playlist names

🔍 How to Verify

Check if Vulnerable:

Check if your ClipBucket version is 5.5.2-#146 or earlier

Check Version:

Check the version.php file or admin panel for version information

Verify Fix Applied:

Test creating a playlist with basic XSS payload like <script>alert('test')</script> and verify it's properly escaped

📡 Detection & Monitoring

Log Indicators:

  • Unusual playlist creation patterns
  • Playlist names containing script tags or JavaScript code

Network Indicators:

  • HTTP requests with suspicious parameters in playlist creation

SIEM Query:

source="web_logs" AND (playlist_name CONTAINS "<script>" OR playlist_name CONTAINS "javascript:")

🔗 References

📤 Share & Export