Vulnerability Description
ClipBucket v5 is an open source video sharing platform. Prior to 5.5.3 - #45, in Clip Bucket V5, The Remote Play allows creating video entries that reference external video URLs without uploading the video files to the server. However, by specifying an internal network host in the video URL, an SSRF can be triggered, causing GET requests to be sent to internal servers. An attacker can exploit this to scan the internal network. Even a regular (non-privileged) user can carry out the attack.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oxygenz | Clipbucket | >= 5.3, < 5.5.3-45 |
Related Weaknesses (CWE)
References
- https://github.com/MacWarrior/clipbucket-v5/commit/a9e0f2322fb37501dfd4f44079fc7Patch
- https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-69xj-2pq3-5ExploitVendor Advisory
FAQ
What is CVE-2026-26005?
CVE-2026-26005 is a vulnerability with a CVSS score of 5.0 (MEDIUM). ClipBucket v5 is an open source video sharing platform. Prior to 5.5.3 - #45, in Clip Bucket V5, The Remote Play allows creating video entries that reference external video URLs without uploading the ...
How severe is CVE-2026-26005?
CVE-2026-26005 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-26005?
Check the references section above for vendor advisories and patch information. Affected products include: Oxygenz Clipbucket.