CVE-2026-26005

5.0 MEDIUM

📋 TL;DR

ClipBucket v5's Remote Play feature allows users to create video entries referencing external URLs. Attackers can exploit this by specifying internal network hosts in video URLs, triggering Server-Side Request Forgery (SSRF) attacks that send GET requests to internal servers. This vulnerability affects all ClipBucket v5 installations prior to version 5.5.3 - #45, and can be exploited by regular non-privileged users.

💻 Affected Systems

Products:
  • ClipBucket v5
Versions: All versions prior to 5.5.3 - #45
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The Remote Play feature must be enabled, but this is a standard feature of ClipBucket v5.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could map internal network infrastructure, access sensitive internal services, or potentially chain with other vulnerabilities to gain further access to internal systems.

🟠

Likely Case

Internal network reconnaissance and information disclosure about internal services, potentially leading to further targeted attacks.

🟢

If Mitigated

Limited to information gathering about internal network structure if proper network segmentation and access controls are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user authentication but no special privileges. The attack vector is straightforward - simply creating a video entry with a malicious URL.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.5.3 - #45

Vendor Advisory: https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-69xj-2pq3-5r4v

Restart Required: No

Instructions:

1. Update ClipBucket v5 to version 5.5.3 - #45 or later. 2. Apply the patch from commit a9e0f2322fb37501dfd4f44079fc7826a132503a. 3. Verify the fix by testing Remote Play functionality with internal URLs.

🔧 Temporary Workarounds

Disable Remote Play Feature

all

Temporarily disable the Remote Play functionality that allows external video URLs.

# Modify ClipBucket configuration to disable remote video URL processing
# Check configuration files for 'remote_play' or similar settings

Implement URL Validation

all

Add server-side validation to reject internal IP addresses and localhost URLs in video entries.

# Add validation in video processing code to block:
# - 127.0.0.0/8, ::1
# - 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16
# - Link-local addresses (169.254.0.0/16, fe80::/10)

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ClipBucket servers from sensitive internal networks
  • Deploy web application firewall (WAF) rules to detect and block SSRF attempts

🔍 How to Verify

Check if Vulnerable:

Check if ClipBucket version is earlier than 5.5.3 - #45 and if Remote Play feature is enabled.

Check Version:

Check ClipBucket configuration files or admin panel for version information

Verify Fix Applied:

Attempt to create a video entry with an internal URL (like http://127.0.0.1) and verify it's rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual video creation patterns
  • Multiple failed attempts with internal URLs
  • Video entries with suspicious hostnames

Network Indicators:

  • Outbound HTTP requests from ClipBucket server to internal IP ranges
  • Unusual port scanning patterns from the application server

SIEM Query:

source="clipbucket.log" AND ("remote_play" OR "external_url") AND (dst_ip=10.0.0.0/8 OR dst_ip=172.16.0.0/12 OR dst_ip=192.168.0.0/16 OR dst_ip=127.0.0.0/8)

🔗 References

📤 Share & Export