An issue Clip Bucket v.5.5.2 Build#90 allows a remote attacker to execute arbitrary codes via the file_downloader.php and the file parameter
References
Link | Resource |
---|---|
https://medium.com/@mukund.s1337/cve-2025-55911-clipbucket-5-5-2-build-90-ssrf-via-upload-actions-file-downloader-php-eb49dc02bd6f | Exploit Third Party Advisory |
Configurations
History
25 Sep 2025, 19:40
Type | Values Removed | Values Added |
---|---|---|
First Time |
Oxygenz
Oxygenz clipbucket V5 |
|
CPE | cpe:2.3:a:oxygenz:clipbucket_v5:5.5.2-90:*:*:*:*:*:*:* | |
References | () https://medium.com/@mukund.s1337/cve-2025-55911-clipbucket-5-5-2-build-90-ssrf-via-upload-actions-file-downloader-php-eb49dc02bd6f - Exploit, Third Party Advisory |
18 Sep 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CWE | CWE-77 |
18 Sep 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-18 15:15
Updated : 2025-09-25 19:40
NVD link : CVE-2025-55911
Mitre link : CVE-2025-55911
CVE.ORG link : CVE-2025-55911
JSON object : View
Products Affected
oxygenz
- clipbucket_v5
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')