7.2
CVSSv3

CVE-2015-5533

Published: 23/10/2017 Updated: 09/10/2018
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 655
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

SQL injection vulnerability in counter-options.php in the Count Per Day plugin prior to 3.4.1 for WordPress allows remote authenticated administrators to execute arbitrary SQL commands via the cpd_keep_month parameter to wp-admin/options-general.php. NOTE: this can be leveraged using CSRF to allow remote malicious users to execute arbitrary SQL commands.

Vulnerable Product Search on Vulmon Subscribe to Product

count per day project count per day

Exploits

Advisory ID: HTB23267 Product: Count Per Day WordPress plugin Vendor: Tom Braider Vulnerable Version(s): 34 and probably prior Tested Version: 34 Advisory Publication: July 1, 2015 [without technical details] Vendor Notification: July 1, 2015 Vendor Patch: July 1, 2015 Public Disclosure: July 22, 2015 Vulnerability Type: SQL Injection [CWE- ...
WordPress Count Per Day plugin version 34 suffers from a remote SQL injection vulnerability ...