header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Count Per Day WordPress plugin SQL Injection Vulnerability

The SQL Injection vulnerability in the Count Per Day WordPress plugin allows remote attackers with administrative privileges to execute arbitrary SQL commands and gain control of sensitive information in the application's database. The vulnerability is caused by insufficient filtration of input data passed via the 'cpd_keep_month' HTTP POST parameter to the '/wp-admin/options-general.php' script. An attacker can exploit this vulnerability through a CSRF vector since the application does not check the origin of HTTP requests.

Recent Exploits: