An issue Clip Bucket v.5.5.2 Build#90 allows a remote attacker to execute arbitrary codes via the file_downloader.php and the file parameter
References
| Link | Resource |
|---|---|
| https://medium.com/@mukund.s1337/cve-2025-55911-clipbucket-5-5-2-build-90-ssrf-via-upload-actions-file-downloader-php-eb49dc02bd6f | Exploit Third Party Advisory |
Configurations
History
25 Sep 2025, 19:40
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://medium.com/@mukund.s1337/cve-2025-55911-clipbucket-5-5-2-build-90-ssrf-via-upload-actions-file-downloader-php-eb49dc02bd6f - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:a:oxygenz:clipbucket_v5:5.5.2-90:*:*:*:*:*:*:* | |
| First Time |
Oxygenz
Oxygenz clipbucket V5 |
18 Sep 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-77 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
18 Sep 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-18 15:15
Updated : 2025-09-25 19:40
NVD link : CVE-2025-55911
Mitre link : CVE-2025-55911
CVE.ORG link : CVE-2025-55911
JSON object : View
Products Affected
oxygenz
- clipbucket_v5
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
