{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T14:32:44.837","vulnerabilities":[{"cve":{"id":"CVE-2026-21875","sourceIdentifier":"security-advisories@github.com","published":"2026-01-08T00:16:00.457","lastModified":"2026-01-27T19:05:52.837","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"ClipBucket v5 is an open source video sharing platform. Versions 5.5.2-#187 and below allow an attacker to perform Blind SQL Injection through the add comment section within a channel. When adding a comment within a channel, there is a POST request to the /actions/ajax.php endpoint. The obj_id parameter within the POST request to /actions/ajax.php is then used within the user_exists function of the upload/includes/classes/user.class. php file as the $id parameter. It is then used within the count function of the upload/includes/classes/db.class. php file. The $id parameter is concatenated into the query without validation or sanitization, and a user-supplied input like 1' or 1=1-- - can be used to trigger the injection. This issue does not have a fix at the time of publication."},{"lang":"es","value":"ClipBucket v5 es una plataforma de código abierto para compartir vídeos. Las versiones 5.5.2-#187 y anteriores permiten a un atacante realizar una inyección SQL ciega a través de la sección de comentarios de un canal. Al añadir un comentario en un canal, se envía una solicitud POST al punto final /actions/ajax.php. El parámetro obj_id de la solicitud POST a /actions/ajax.php se utiliza posteriormente en la función user_exists del archivo upload/includes/classes/user.class.php como parámetro $id. A continuación, se utiliza en la función count del archivo upload/includes/classes/db.class.php. El parámetro $id se concatena en la consulta sin validación ni sanitización, y una entrada proporcionada por el usuario como 1' o 1=1-- puede utilizarse para desencadenar la inyección. Esta vulnerabilidad no tiene solución en el momento de la publicación."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oxygenz:clipbucket:*:*:*:*:*:*:*:*","versionStartIncluding":"5.3","versionEndExcluding":"5.5.2-191","matchCriteriaId":"9F870E38-684D-4CB6-9A2C-E8CA278B45E0"}]}]}],"references":[{"url":"https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-crpv-fmc4-j392","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-crpv-fmc4-j392","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]}]}}]}