Description
WordPress Plugin 3dady real-time web stats is prone to a cross-site request forgery vulnerability. Exploiting this issue may allow a remote attacker to perform certain administrative actions and gain unauthorized access to the affected application; other attacks are also possible. WordPress Plugin 3dady real-time web stats version 1.0 is vulnerable.
Remediation
Edit the source code to ensure that CSRF protection is implemented with Nonce-like mechanism or disable the plugin until a fix is available
References
https://sploitus.com/exploit?id=WPEX-ID:36EE3733-28B3-48DD-BA1E-08B7BBE2FE2D
https://www.exploit-db.com/exploits/51021
https://wordpress.org/plugins/3dady-real-time-web-stats/#description
Related Vulnerabilities
MySQL CVE-2012-1689 Vulnerability (CVE-2012-1689)
MySQL CVE-2019-2911 Vulnerability (CVE-2019-2911)
WordPress Plugin dsSearchAgent:WordPress Edition Cross-Site Scripting (1.0-beta10)
WordPress Plugin JSmol2WP Multiple Vulnerabilities (1.07)
Drupal 7PK - Security Features Vulnerability (CVE-2016-3168)