Unauthenticated SQL Injection Vulnerability in HTML5 Video Player Plugin for WordPress
CVE-2024-1061
9.8CRITICAL
Key Information:
- Vendor
- Wordpress
- Status
- Vendor
- CVE Published:
- 30 January 2024
Badges
🟣 EPSS 79%📰 News Worthy
Summary
The HTML5 Video Player Plugin for WordPress, prior to version 2.5.25, contains a significant vulnerability that allows unauthenticated users to exploit the 'id' parameter in the 'get_view' function. This could result in unauthorized access to the database, enabling potential data manipulation and exposure. It is crucial for website administrators to update to the latest version to mitigate the risk associated with this attack vector.
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles
References
EPSS Score
79% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
- 📰
First article discovered by CN-SEC
Vulnerability published