CVE-2026-26005
SSRF Vulnerability in ClipBucket V5 Remote Play Allows Internal Scanning
Publication date: 2026-02-12
Last updated on: 2026-02-18
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oxygenz | clipbucket | From 5.3 (inc) to 5.5.3-45 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': "CVE-2026-26005 is a Server-Side Request Forgery (SSRF) vulnerability in ClipBucket v5 versions prior to 5.5.3. The vulnerability exists in the Remote Play feature, which allows users to create video entries referencing external video URLs without uploading the files. An attacker can specify an internal network host in the video URL, causing the server to send HTTP GET requests to internal servers. This enables the attacker to scan the internal network by observing the server's responses."}, {'type': 'paragraph', 'content': 'The vulnerability requires only low privileges (a regular user account) and no user interaction beyond sending a crafted request. The root cause is insufficient URL validation that fails to block local IP addresses such as localhost and private IP ranges like 192.168.x.x, allowing SSRF attacks.'}] [1]
How can this vulnerability impact me? :
This vulnerability can impact you by exposing your internal network infrastructure to attackers. An attacker can use it to scan internal hosts and services that are normally inaccessible from outside the network, potentially revealing sensitive internal systems.
The confidentiality impact is considered low, with no impact on integrity or availability. However, the exposure of internal network information can be a significant security risk, as it may facilitate further attacks.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': "This vulnerability can be detected by attempting to trigger the SSRF via the vulnerable endpoint and observing the server's response to crafted requests referencing internal network hosts."}, {'type': 'paragraph', 'content': 'For example, sending a POST request to the endpoint `/actions/remote_play_send_form.php` with parameters including `step=check_link` and `remote_play_file_url` set to an internal IP address URL (e.g., http://192.168.100.3:8025/#example.mp4) can reveal whether internal hosts are reachable.'}, {'type': 'paragraph', 'content': 'The server\'s JSON response differs based on the existence of the internal host: `{"error":"File isn\'t a valid video"}` indicates the internal host exists, while `{"error":"Inputted website is not responding"}` indicates it does not.'}, {'type': 'paragraph', 'content': 'A sample curl command to test this would be:'}, {'type': 'list_item', 'content': 'curl -X POST -d "step=check_link&remote_play_file_url=http://192.168.100.3:8025/#example.mp4" https://your-clipbucket-domain.com/actions/remote_play_send_form.php'}, {'type': 'paragraph', 'content': 'Monitoring such responses can help detect if the SSRF vulnerability is present and exploitable on your system.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
[{'type': 'paragraph', 'content': 'The immediate mitigation step is to upgrade ClipBucket to version 5.5.3 or later, where the vulnerability has been patched.'}, {'type': 'paragraph', 'content': 'The patch includes validation of remote URLs used for video playback to prevent access to internal or reserved IP ranges, rejecting URLs that resolve to private or reserved IP addresses.'}, {'type': 'paragraph', 'content': "Additionally, the fix restricts allowed video file extensions to 'mp4' and 'm3u8' to reduce attack vectors."}, {'type': 'paragraph', 'content': 'If immediate upgrade is not possible, consider implementing network-level restrictions to block outgoing HTTP requests from the ClipBucket server to internal IP ranges, and monitor or restrict user input for video URLs to prevent internal network references.'}] [2]