CVE-2026-32321

ClipBucket v5 is an open source video sharing platform. An authenticated time-based blind SQL injection vulnerability exists in ClipBucket prior to 5.5.3 #80 within the `actions/ajax.php` endpoint. Due to insufficient input sanitization of the `userid` parameter, an authenticated attacker can execute arbitrary SQL queries, leading to full database disclosure and potential administrative account takeover. Version 5.5.3 #80 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:oxygenz:clipbucket:*:*:*:*:*:*:*:*

History

19 Mar 2026, 18:47

Type Values Removed Values Added
First Time Oxygenz clipbucket
Oxygenz
CPE cpe:2.3:a:oxygenz:clipbucket:*:*:*:*:*:*:*:*
References () https://github.com/MacWarrior/clipbucket-v5/commit/726d68b0c9d4c702dce2691c2759b6bf84a1691f - () https://github.com/MacWarrior/clipbucket-v5/commit/726d68b0c9d4c702dce2691c2759b6bf84a1691f - Patch
References () https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-2757-6cp4-v7xx - () https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-2757-6cp4-v7xx - Exploit, Vendor Advisory

18 Mar 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-18 21:16

Updated : 2026-03-19 18:47


NVD link : CVE-2026-32321

Mitre link : CVE-2026-32321

CVE.ORG link : CVE-2026-32321


JSON object : View

Products Affected

oxygenz

  • clipbucket
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')