Description
WordPress Plugin Count per Day is prone to an arbitrary file download and a cross-site scripting vulnerability because it fails to sufficiently verify and sanitize user-supplied data. Attackers may leverage these issues to download arbitrary files in the context of the webserver process and execute arbitrary HTML and script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. WordPress Plugin Count per Day versions prior to 3.1.1 are vulnerable.
Remediation
Update to plugin version 3.1.1 or latest
References
http://www.securityfocus.com/bid/51402/exploit
http://www.exploit-db.com/exploits/18355/
http://packetstormsecurity.com/files/108631/countperday-downloadxss.txt