Summary
WordPress Count per Day plugin is prone to an arbitrary file download and a cross-site scripting vulnerability because they fail to sufficiently sanitize user-supplied data.
Attackers may leverage these issues to download arbitrary files in the context of the webserver process and execute arbitrary HTML and script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
WordPress Count per Day versions prior to 3.1.1 are vulnerable.
Solution
Vendor updates are available. Please see the references for details.
References
Updated on 2015-03-25
Severity
Classification
-
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- AN Guestbook Local File Inclusion Vulnerability
- Apache Tomcat Information Disclosure Vulnerability
- Apache Roller 'q' Parameter Cross Site Scripting Vulnerability
- AeroMail Cross Site Request Forgery, HTML Injection and Cross Site Scripting Vulnerabilities
- AjaXplorer 'doc_file' Parameter Local File Disclosure Vulnerability