Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 18 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Oxygenz
Oxygenz clipbucket |
|
| CPEs | cpe:2.3:a:oxygenz:clipbucket:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Oxygenz
Oxygenz clipbucket |
|
| Metrics |
cvssV3_1
|
Wed, 11 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Macwarrior
Macwarrior clipbucket-v5 |
|
| Vendors & Products |
Macwarrior
Macwarrior clipbucket-v5 |
Tue, 10 Feb 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ClipBucket v5 is an open source video sharing platform. Prior to 5.5.3 - #40, a Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability exists in ClipBucket's avatar and background image upload functionality. The application moves uploaded files to a web-accessible location before validating them, creating a window where an attacker can execute arbitrary PHP code before the file is deleted. The uploaded file was moved to a web-accessible path via move_uploaded_file(), then validated via ValidateImage(). If validation failed, the file was deleted via @unlink(). This vulnerability is fixed in 5.5.3 - #40. | |
| Title | ClipBucket v5 Affected by Remote Code Execution via Avatar/Background File Upload Race Condition | |
| Weaknesses | CWE-367 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-11T15:30:33.904Z
Reserved: 2026-02-05T16:48:00.426Z
Link: CVE-2026-25728
Updated: 2026-02-11T15:30:04.295Z
Status : Analyzed
Published: 2026-02-10T18:16:38.053
Modified: 2026-02-18T15:02:02.293
Link: CVE-2026-25728
No data.
OpenCVE Enrichment
Updated: 2026-02-10T21:41:58Z