Impact
The vulnerability in ClipBucket version 5.5.2 allows arbitrary code execution through the authentication interface, the login page endpoint, and components that handle HTTP response security headers. This flaw can compromise confidential information, alter system state, or disrupt services. The description suggests an injection or command execution path, though the precise method is not disclosed.
Affected Systems
Only ClipBucket 5.5.2 is identified as impacted. No other vendors or product variants are currently known to be affected.
Risk and Exploitability
With a CVSS score of 7.3, the issue is considered high severity. EPSS is not quoted and the vulnerability is not listed in the KEV catalog, but the possibility of remote code execution on a publicly accessible login interface implies a high exploitation likelihood. Attackers would target the login routine or attempt to exploit header manipulation to trigger code execution, assuming no access restrictions have been applied.
OpenCVE Enrichment