Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-21875 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Blind SQL Injection in ClipBucket v5.5.2-#187 and earlier. <br>πŸ“‰ **Consequences**: Attackers can extract database content via the `/actions/ajax.php` endpoint.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-89 (SQL Injection). <br>❌ **Flaw**: The `obj_id` parameter in `/actions/ajax.php` is **not validated or sanitized**. Malicious input bypasses security checks directly.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: MacWarrior's **ClipBucket v5**. <br>πŸ“… **Version**: Specifically **5.5.2-#187** and all prior versions. <br>🌐 **Type**: Open-source PHP script for video sharing sites.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: <br>πŸ”“ **Access**: Full database read/write potential. <br>πŸ‘‘ **Privileges**: High (CVSS H).…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: **LOW**. <br>🚫 **Auth**: No authentication required (`PR:N`). <br>🌐 **Network**: Remote exploitation (`AV:N`). <br>πŸ‘€ **UI**: No user interaction needed (`UI:N`). Easy to exploit!

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exploit**: **None listed** in current data (`pocs: []`). <br>⚠️ **Status**: While no public PoC is attached, the vulnerability type (Blind SQLi) is well-known. Exploitation tools likely exist in the wild.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: <br>1. Scan for `/actions/ajax.php` endpoint. <br>2. Test `obj_id` parameter with SQL injection payloads (e.g., `' OR 1=1--`). <br>3. Look for time-based delays or error responses indicating Blind SQLi.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fix Status**: **Yes**. <br>πŸ”— **Source**: Official GitHub Advisory [GHSA-crpv-fmc4-j392](https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-crpv-fmc4-j392).…

Q9What if no patch? (Workaround)

πŸ›‘οΈ **No Patch Workaround**: <br>1. **WAF**: Block SQL keywords in `obj_id` parameter. <br>2. **Input Validation**: Strictly whitelist integer values for `obj_id`. <br>3.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. <br>πŸ“ˆ **CVSS**: High (9.8/10 implied by H/I/H). <br>⚑ **Priority**: Patch immediately. Remote, unauthenticated exploitation makes this a high-priority target for attackers.