ClipBucket version 2.6 and earlier contains a critical vulnerability in the ofc_upload_image.php script located at /admin_area/charts/ofc-library/. This endpoint allows unauthenticated users to upload arbitrary files, including executable PHP scripts. Once uploaded, the attacker can access the file via a predictable path and trigger remote code execution.
References
| Link | Resource |
|---|---|
| https://clipbucket.com/ | Product |
| https://github.com/arslancb/clipbucket | Product |
| https://packetstorm.news/files/id/123480 | Exploit Third Party Advisory |
| https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/clipbucket_upload_exec.rb | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/clipbucket-arbitrary-file-upload-rce | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-07-31 15:15
Updated : 2025-09-23 23:36
NVD link : CVE-2013-10040
Mitre link : CVE-2013-10040
CVE.ORG link : CVE-2013-10040
JSON object : View
Products Affected
clip-bucket
- clipbucket
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
