CVE-2026-21875

Source
https://cve.org/CVERecord?id=CVE-2026-21875
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-21875.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-21875
Aliases
  • GHSA-crpv-fmc4-j392
Published
2026-01-07T23:52:18.729Z
Modified
2026-03-14T12:47:11.980148Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
ClipBucket v5 Vulnerable to Blind SQL Injection through Channel Comments
Details

ClipBucket v5 is an open source video sharing platform. Versions 5.5.2-#187 and below allow an attacker to perform Blind SQL Injection through the add comment section within a channel. When adding a comment within a channel, there is a POST request to the /actions/ajax.php endpoint. The objid parameter within the POST request to /actions/ajax.php is then used within the userexists function of the upload/includes/classes/user.class. php file as the $id parameter. It is then used within the count function of the upload/includes/classes/db.class. php file. The $id parameter is concatenated into the query without validation or sanitization, and a user-supplied input like 1' or 1=1-- - can be used to trigger the injection. This issue does not have a fix at the time of publication.

Database specific
{
    "cwe_ids": [
        "CWE-89"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/21xxx/CVE-2026-21875.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/macwarrior/clipbucket-v5

Affected ranges

Type
GIT
Repo
https://github.com/macwarrior/clipbucket-v5
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "<= 5.5.2-#187"
        }
    ]
}

Affected versions

5.*
5.3
5.3.1
5.4.0
5.4.1
5.5.0
5.5.1
5.5.2-#103
5.5.2-#106
5.5.2-#114
5.5.2-#117
5.5.2-#120
5.5.2-#123
5.5.2-#129
5.5.2-#133
5.5.2-#135
5.5.2-#138
5.5.2-#140
5.5.2-#147
5.5.2-#152
5.5.2-#162
5.5.2-#163
5.5.2-#164
5.5.2-#182
5.5.2-#187
5.5.2-#25
5.5.2-#38
5.5.2-#4
5.5.2-#45
5.5.2-#58
5.5.2-#69
5.5.2-#74
5.5.2-#82
5.5.2-#86
5.5.2-#90
5.5.2-#98

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-21875.json"