
Cloud Vulnerability DB
A community-led vulnerabilities database
The HTML5 Video Player WordPress Plugin versions prior to 2.5.25 is affected by an unauthenticated SQL injection vulnerability. The vulnerability exists in the 'id' parameter within the 'get_view' function, which can be accessed without authentication (Tenable Research, NVD).
The SQL injection vulnerability exists due to improper validation of the 'id' parameter used in the 'get_view' function. The vulnerability can be exploited through a GET HTTP request against a WordPress instance using a vulnerable version of the plugin. The severity of this vulnerability is rated as Critical with a CVSS v3.1 base score of 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) according to NVD, while Tenable assessed it with a score of 8.6 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N) (NVD, Tenable Research).
This vulnerability allows unauthenticated attackers to perform SQL injection attacks against affected WordPress installations. The critical severity rating indicates that successful exploitation could lead to unauthorized access to sensitive data, potential database manipulation, and possible system compromise (NVD).
Users should upgrade to HTML5 Video Player WordPress Plugin version 2.5.25 or later to address this vulnerability. While the vendor did not explicitly acknowledge the vulnerability, the issue appears to have been fixed in version 2.5.25 (Tenable Research).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."