ClipBucket v5 is an open source video sharing platform. Prior to version 5.5.2 #147, ClipBucket v5 is vulnerable to arbitrary PHP code execution. In /upload/admin_area/actions/update_launch.php, the "type" parameter from a POST request is embedded into PHP tags and executed. Proper sanitization is not performed, and by injecting malicious code an attacker can execute arbitrary PHP code. This allows an attacker to achieve RCE. This issue has been resolved in version 5.5.2 #147.
Metrics
Affected Vendors & Products
References
History
Mon, 20 Oct 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 20 Oct 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | ClipBucket v5 is an open source video sharing platform. Prior to version 5.5.2 #147, ClipBucket v5 is vulnerable to arbitrary PHP code execution. In /upload/admin_area/actions/update_launch.php, the "type" parameter from a POST request is embedded into PHP tags and executed. Proper sanitization is not performed, and by injecting malicious code an attacker can execute arbitrary PHP code. This allows an attacker to achieve RCE. This issue has been resolved in version 5.5.2 #147. | |
Title | ClipBucket v5 executes arbitrary PHP code | |
Weaknesses | CWE-94 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-20T18:39:41.953Z
Reserved: 2025-10-13T16:26:12.181Z
Link: CVE-2025-62429

Updated: 2025-10-20T18:39:31.633Z

Status : Received
Published: 2025-10-20T17:15:38.433
Modified: 2025-10-20T19:15:38.200
Link: CVE-2025-62429

No data.

No data.