CVE-2024-5522
📋 TL;DR
This SQL injection vulnerability in the HTML5 Video Player WordPress plugin allows unauthenticated attackers to execute arbitrary SQL commands on affected WordPress sites. All WordPress installations using vulnerable versions of this plugin are affected, potentially exposing database contents.
💻 Affected Systems
- HTML5 Video Player WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including sensitive data theft, privilege escalation, and potential remote code execution through database functions.
Likely Case
Data exfiltration from WordPress database including user credentials, private content, and configuration data.
If Mitigated
Limited impact with proper database permissions and network segmentation, though data exposure still possible.
🎯 Exploit Status
Exploitation requires no authentication and uses standard SQL injection techniques.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.5.27
Vendor Advisory: https://wpscan.com/vulnerability/bc76ef95-a2a9-4185-8ed9-1059097a506a/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find HTML5 Video Player plugin. 4. Click Update Now to version 2.5.27 or later.
🔧 Temporary Workarounds
Disable vulnerable REST endpoint
allRemove or restrict access to the vulnerable REST API endpoint
Add to theme functions.php: remove_action('rest_api_init', 'html5_video_player_register_rest_route');
Web Application Firewall rule
allBlock SQL injection patterns targeting the vulnerable endpoint
WAF specific - create rule to block requests containing SQL injection patterns to /wp-json/html5-video-player/* endpoints
🧯 If You Can't Patch
- Disable the HTML5 Video Player plugin immediately
- Implement network-level restrictions to block external access to WordPress REST API
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > HTML5 Video Player version. If version is below 2.5.27, you are vulnerable.
Check Version:
wp plugin list --name='html5-video-player' --field=version
Verify Fix Applied:
Confirm plugin version is 2.5.27 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed REST API requests to /wp-json/html5-video-player/*
- Database error messages containing SQL syntax
Network Indicators:
- HTTP POST requests to /wp-json/html5-video-player/* with SQL injection patterns
- Unusual outbound database connections from web server
SIEM Query:
source="web_server" AND (uri_path="/wp-json/html5-video-player/*" AND (request_body CONTAINS "UNION" OR request_body CONTAINS "SELECT" OR request_body CONTAINS "--"))