The HTML5 Video Player WordPress plugin before 2.5.27 does not sanitize and escape a parameter from a REST route before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/bc76ef95-a2a9-4185-8ed9-1059097a506a/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/bc76ef95-a2a9-4185-8ed9-1059097a506a/ | Exploit Third Party Advisory |
Configurations
History
19 May 2025, 21:03
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-89 | |
References | () https://wpscan.com/vulnerability/bc76ef95-a2a9-4185-8ed9-1059097a506a/ - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:bplugins:html5_video_player:*:*:*:*:*:wordpress:*:* | |
First Time |
Bplugins
Bplugins html5 Video Player |
Information
Published : 2024-06-20 06:15
Updated : 2025-05-19 21:03
NVD link : CVE-2024-5522
Mitre link : CVE-2024-5522
CVE.ORG link : CVE-2024-5522
JSON object : View
Products Affected
bplugins
- html5_video_player
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')