Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 14 May 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Macwarrior
Macwarrior clipbucket-v5 |
|
| Vendors & Products |
Macwarrior
Macwarrior clipbucket-v5 |
Thu, 14 May 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ClipBucket v5 is an open source video sharing platform. Prior to 5.5.3 - #122, there is a critical SQL Injection (SQLi) vulnerability in ClipBucket, exploitable through the type parameter on the authenticated admin endpoint admin_area/action_logs.php. The endpoint admin_area/action_logs.php reads $_GET['type'], stores it in $result_array['type'], and forwards it into fetch_action_logs(), where the value is concatenated directly into a SQL WHERE condition on action_type without parameterization. This allows UNION-based SQL injection and direct data exfiltration from the database. This vulnerability is fixed in 5.5.3 - #122. | |
| Title | ClipBucket: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T20:45:54.218Z
Reserved: 2026-04-30T16:44:48.377Z
Link: CVE-2026-42847
No data.
Status : Deferred
Published: 2026-05-14T21:16:46.393
Modified: 2026-05-15T14:55:57.710
Link: CVE-2026-42847
No data.
OpenCVE Enrichment
Updated: 2026-05-14T22:30:25Z