The HTML5 Video Player WordPress plugin before 2.5.27 does not sanitize and escape a parameter from a REST route before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
Metrics
Affected Vendors & Products
References
History
Mon, 19 May 2025 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Bplugins
Bplugins html5 Video Player |
|
Weaknesses | CWE-89 | |
CPEs | cpe:2.3:a:bplugins:html5_video_player:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Bplugins
Bplugins html5 Video Player |

Status: PUBLISHED
Assigner: WPScan
Published: 2024-06-20T06:00:04.044Z
Updated: 2024-08-01T21:18:05.372Z
Reserved: 2024-05-30T08:22:03.271Z
Link: CVE-2024-5522

Updated: 2024-08-01T21:18:05.372Z

Status : Analyzed
Published: 2024-06-20T06:15:10.197
Modified: 2025-05-19T21:03:35.523
Link: CVE-2024-5522

No data.