SQL Injection Vulnerability in Count Per Day Plugin for WordPress
CVE-2015-5533
7.2HIGH
Summary
The Count Per Day plugin for WordPress prior to version 3.4.1 contains an SQL injection vulnerability in the counter-options.php file. This issue allows remote authenticated administrators to send specially crafted requests to the wp-admin/options-general.php endpoint, specifically through the cpd_keep_month parameter. Exploitations can lead to arbitrary SQL command execution, potentially compromising the integrity of the database. Moreover, this vulnerability can be exploited in conjunction with CSRF attacks, allowing remote attackers to execute malicious SQL commands under certain conditions.
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved