CVE-2015-5533
Severity CVSS v4.0:
Pending analysis
Type:
CWE-89
SQL Injection
Publication date:
23/10/2017
Last modified:
20/04/2025
Description
SQL injection vulnerability in counter-options.php in the Count Per Day plugin before 3.4.1 for WordPress allows remote authenticated administrators to execute arbitrary SQL commands via the cpd_keep_month parameter to wp-admin/options-general.php. NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary SQL commands.
Impact
Base Score 3.x
7.20
Severity 3.x
HIGH
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:count_per_day_project:count_per_day:*:*:*:*:*:wordpress:*:* | 3.4 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/132811/WordPress-Count-Per-Day-3.4-SQL-Injection.html
- http://www.securityfocus.com/archive/1/536056/100/0/threaded
- https://plugins.trac.wordpress.org/changeset/1190683/count-per-day
- https://wpvulndb.com/vulnerabilities/8110
- https://www.exploit-db.com/exploits/37707/
- https://www.htbridge.com/advisory/HTB23267
- http://packetstormsecurity.com/files/132811/WordPress-Count-Per-Day-3.4-SQL-Injection.html
- http://www.securityfocus.com/archive/1/536056/100/0/threaded
- https://plugins.trac.wordpress.org/changeset/1190683/count-per-day
- https://wpvulndb.com/vulnerabilities/8110
- https://www.exploit-db.com/exploits/37707/
- https://www.htbridge.com/advisory/HTB23267



