Home

Description

ClipBucket is a web-based video-sharing platform. In ClipBucket version 5.5.2 - #146 and earlier, the /admin_area/template_editor.php endpoint is vulnerable to path traversal. The validation of the file-loading path is inadequate, allowing authenticated administrators to read and write arbitrary files outside the intended template directory by inserting path traversal sequences into the folder parameter. An attacker with administrator privileges can exploit this vulnerability to read sensitive files such as /etc/passwd and modify writable files on the system, potentially leading to sensitive information disclosure and compromise of the application or server. This issue is fixed in version 5.5.2 - #147.

PUBLISHED Reserved 2025-10-13 | Published 2025-10-17 | Updated 2025-10-17 | Assigner GitHub_M




MEDIUM: 6.7CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

< 5.5.2 - #147
affected

References

github.com/...ket-v5/security/advisories/GHSA-3v2p-rfwx-52qj

github.com/...ommit/c06d0f2e69c9acb008cebbd34fd5f29da3191a28

cve.org (CVE-2025-62424)

nvd.nist.gov (CVE-2025-62424)

Download JSON