Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 25 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Oxygenz
Oxygenz clipbucket |
|
| CPEs | cpe:2.3:a:oxygenz:clipbucket:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Oxygenz
Oxygenz clipbucket |
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Clip-bucket
Clip-bucket clipbucket |
|
| Vendors & Products |
Clip-bucket
Clip-bucket clipbucket |
Fri, 21 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Nov 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ClipBucket v5 is an open source video sharing platform. In ClipBucket version 5.5.2, a change to network.class.php causes the application to dynamically build the server URL from the incoming HTTP Host header when the configuration base_url is not set. Because Host is a client-controlled header, an attacker can supply an arbitrary Host value. This allows an attacker to cause password-reset links (sent by forget.php) to be generated with the attacker’s domain. If a victim follows that link and enters their activation code on the attacker-controlled domain, the attacker can capture the code and use it to reset the victim’s password and take over the account. This issue has been patched in version 5.5.2#162. | |
| Title | ClipBucket v5 is vulnerable to password reset link manipulation | |
| Weaknesses | CWE-640 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-21T16:33:09.195Z
Reserved: 2025-10-20T19:41:22.739Z
Link: CVE-2025-62709
Updated: 2025-11-21T16:32:50.735Z
Status : Analyzed
Published: 2025-11-20T17:15:51.087
Modified: 2025-11-25T19:04:18.937
Link: CVE-2025-62709
No data.
OpenCVE Enrichment
Updated: 2025-11-24T09:09:25Z