Description
HTML5 Video Player 1.2.5 contains a local buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized key code string. Attackers can craft a malicious payload exceeding 997 bytes and paste it into the KEY CODE field in the Help Register dialog to trigger code execution and spawn a calculator process.
Published: 2026-04-12
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Code Execution
Action: Immediate Patch
AI Analysis

Impact

A vulnerability in HTML5 Video Player 1.2.5 occurs when the application reads a key code string that exceeds the internal buffer size. The overflow enables an attacker to inject malicious code, which can be executed in the context of the running process, as demonstrated by spawning a calculator process. The weakness is a classic buffer overflow (CWE‑787) and directly compromises the integrity and confidentiality of the system local to the user who opens the dialog.

Affected Systems

The vulnerable product is the HTML5 Video Player from the bplugins vendor, version 1.2.5. Any installation of this specific version that allows the Help Register dialog to accept user input is affected.

Risk and Exploitability

The CVSS score of 8.6 indicates a high severity, and the vulnerability is local in nature, requiring user interaction to activate the exploit payload. No EPSS score is published, and the vulnerability is not listed in the CISA KEV catalog, suggesting limited documented exploitation but still a significant risk due to the high base score and ease of tricking a user to enter the oversized string.

Generated by OpenCVE AI on April 12, 2026 at 13:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update HTML5 Video Player to the latest available version from the vendor’s download page
  • Close the application to prevent accidental use of the vulnerable dialog
  • Verify that no pending updates are available by checking the vendor’s website regularly
  • If an update is not immediately available, restrict user access to the KEY CODE field by disabling or removing the Help Register dialog

Generated by OpenCVE AI on April 12, 2026 at 13:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Socusoft
Socusoft html5 Video Player
CPEs cpe:2.3:a:socusoft:html5_video_player:1.2.5:*:*:*:*:*:*:*
Vendors & Products Socusoft
Socusoft html5 Video Player

Wed, 15 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Html5videoplayer
Html5videoplayer html5 Video Player
Vendors & Products Html5videoplayer
Html5videoplayer html5 Video Player

Sun, 12 Apr 2026 12:45:00 +0000

Type Values Removed Values Added
Description HTML5 Video Player 1.2.5 contains a local buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized key code string. Attackers can craft a malicious payload exceeding 997 bytes and paste it into the KEY CODE field in the Help Register dialog to trigger code execution and spawn a calculator process.
Title HTML5 Video Player 1.2.5 Local Buffer Overflow Non-SEH
First Time appeared Bplugins
Bplugins html5 Video Player
Weaknesses CWE-787
CPEs cpe:2.3:a:bplugins:html5_video_player:1.2.5:*:*:*:*:*:*:*
Vendors & Products Bplugins
Bplugins html5 Video Player
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Bplugins Html5 Video Player
Html5videoplayer Html5 Video Player
Socusoft Html5 Video Player
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-15T15:21:21.456Z

Reserved: 2026-04-05T15:31:44.950Z

Link: CVE-2019-25689

cve-icon Vulnrichment

Updated: 2026-04-15T15:21:17.221Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-12T13:16:31.923

Modified: 2026-04-17T16:19:39.107

Link: CVE-2019-25689

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:56:01Z

Weaknesses