Summary
WordPress Count per Day plugin is prone to an arbitrary file download and a cross-site scripting vulnerability because they fail to sufficiently sanitize user-supplied data.
Attackers may leverage these issues to download arbitrary files in the context of the webserver process and execute arbitrary HTML and script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
WordPress Count per Day versions prior to 3.1.1 are vulnerable.
Solution
Vendor updates are available. Please see the references for details.
References
Updated on 2015-03-25
Severity
Classification
-
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- /cgi-bin directory browsable ?
- Apache Archiva Home Page Cross-Site Scripting vulnerability
- Aardvark Topsites <= 4.2.2 Remote File Inclusion Vulnerability
- Apache ActiveMQ 'Cron Jobs' Cross Site Scripting Vulnerability
- Apache Web Server Configuration File Environment Variable Local Buffer Overflow Vulnerability