The HTML5 Video Player WordPress plugin before 2.5.27 does not sanitize and escape a parameter from a REST route before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 19 May 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bplugins
Bplugins html5 Video Player |
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:bplugins:html5_video_player:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Bplugins
Bplugins html5 Video Player |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-01T21:18:05.372Z
Reserved: 2024-05-30T08:22:03.271Z
Link: CVE-2024-5522
Updated: 2024-08-01T21:18:05.372Z
Status : Analyzed
Published: 2024-06-20T06:15:10.197
Modified: 2025-05-19T21:03:35.523
Link: CVE-2024-5522
No data.
OpenCVE Enrichment
No data.
Weaknesses