The HTML5 Video Player WordPress plugin before 2.5.27 does not sanitize and escape a parameter from a REST route before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
[
{
"vendor": "Unknown",
"product": "HTML5 Video Player ",
"versions": [
{
"status": "affected",
"versionType": "semver",
"version": "0",
"lessThan": "2.5.27"
}
],
"defaultStatus": "unaffected"
}
]