ClipBucket 5.5.2 is affected by an improper access control issue where the product is shipped or deployed with hardcoded default administrative credentials. An unauthenticated remote attacker can log in to the administrative panel using these default credentials, resulting in full administrative control of the application.
References
| Link | Resource |
|---|---|
| http://clipbucket.com | Product |
| https://medium.com/@arpit03sharma2003/cve-2025-67418-when-default-credentials-become-a-remote-root-button-03be5ee4b927 | Exploit Mitigation Third Party Advisory |
Configurations
History
02 Jan 2026, 17:39
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://clipbucket.com - Product | |
| References | () https://medium.com/@arpit03sharma2003/cve-2025-67418-when-default-credentials-become-a-remote-root-button-03be5ee4b927 - Exploit, Mitigation, Third Party Advisory | |
| First Time |
Oxygenz clipbucket
Oxygenz |
|
| CPE | cpe:2.3:a:oxygenz:clipbucket:*:*:*:*:*:*:*:* |
22 Dec 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-22 20:15
Updated : 2026-01-02 17:39
NVD link : CVE-2025-67418
Mitre link : CVE-2025-67418
CVE.ORG link : CVE-2025-67418
JSON object : View
Products Affected
oxygenz
- clipbucket
CWE
CWE-798
Use of Hard-coded Credentials
