CVE-2026-26005

Source
https://cve.org/CVERecord?id=CVE-2026-26005
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-26005.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-26005
Aliases
  • GHSA-69xj-2pq3-5r4v
Published
2026-02-12T20:34:01.275Z
Modified
2026-02-20T02:26:24.886333Z
Severity
  • 5.0 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N CVSS Calculator
Summary
ClipBucket v5 enables internal network scans via an SSRF vulnerability
Details

ClipBucket v5 is an open source video sharing platform. Prior to 5.5.3 - #45, in Clip Bucket V5, The Remote Play allows creating video entries that reference external video URLs without uploading the video files to the server. However, by specifying an internal network host in the video URL, an SSRF can be triggered, causing GET requests to be sent to internal servers. An attacker can exploit this to scan the internal network. Even a regular (non-privileged) user can carry out the attack.

Database specific
{
    "cwe_ids": [
        "CWE-918"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/26xxx/CVE-2026-26005.json"
}
References

Affected packages

Git / github.com/macwarrior/clipbucket-v5

Affected ranges

Type
GIT
Repo
https://github.com/macwarrior/clipbucket-v5
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Introduced
Fixed

Affected versions

5.*
5.3
5.3.1
5.4.0
5.4.1
5.5.0
5.5.1
5.5.2
5.5.2-#103
5.5.2-#106
5.5.2-#114
5.5.2-#117
5.5.2-#120
5.5.2-#123
5.5.2-#129
5.5.2-#133
5.5.2-#135
5.5.2-#138
5.5.2-#140
5.5.2-#147
5.5.2-#152
5.5.2-#162
5.5.2-#163
5.5.2-#164
5.5.2-#182
5.5.2-#187
5.5.2-#25
5.5.2-#38
5.5.2-#4
5.5.2-#45
5.5.2-#58
5.5.2-#69
5.5.2-#74
5.5.2-#82
5.5.2-#86
5.5.2-#90
5.5.2-#98
5.5.3-#10

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-26005.json"