Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.103259
Category:Web application abuses
Title:WordPress Count per Day Plugin 'month' Parameter SQL Injection Vulnerability
Summary:The 'Count per Day' plug-in for WordPress is prone to an SQL-injection;vulnerability because it fails to sufficiently sanitize user-supplied;data before using it in an SQL query.;;Exploiting this issue could allow an attacker to compromise the;application, access or modify data, or exploit latent vulnerabilities;in the underlying database.;;Count per Day versions 2.17 and prior are vulnerable.
Description:Summary:
The 'Count per Day' plug-in for WordPress is prone to an SQL-injection
vulnerability because it fails to sufficiently sanitize user-supplied
data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the
application, access or modify data, or exploit latent vulnerabilities
in the underlying database.

Count per Day versions 2.17 and prior are vulnerable.

Solution:
No known solution was made available for at least one year since the disclosure of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

CopyrightCopyright (C) 2011 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.