Description
WordPress Plugin Count per Day is prone to an arbitrary file download and a cross-site scripting vulnerability because it fails to sufficiently verify and sanitize user-supplied data. Attackers may leverage these issues to download arbitrary files in the context of the webserver process and execute arbitrary HTML and script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. WordPress Plugin Count per Day versions prior to 3.1.1 are vulnerable.
Remediation
Update to plugin version 3.1.1 or latest
References
http://www.securityfocus.com/bid/51402/exploit
http://www.exploit-db.com/exploits/18355/
http://packetstormsecurity.com/files/108631/countperday-downloadxss.txt
Related Vulnerabilities
WordPress Plugin Newsletter-Send awesome emails from WordPress SQL Injection (3.0.8)
WordPress Plugin Recart-The New GhostMonitor Unspecified Vulnerability (1.5.0)
PHP Interpretation Conflict Vulnerability (CVE-2025-1217)
Liferay DXP Incorrect Default Permissions Vulnerability (CVE-2022-42128)
Oracle Application Server CVE-2008-1824 Vulnerability (CVE-2008-1824)