CVE-2012-0896

NUCLEI

WordPress <3.1.1 - Path Traversal

Title source: llm

Description

Absolute path traversal vulnerability in download.php in the Count Per Day module before 3.1.1 for WordPress allows remote attackers to read arbitrary files via the f parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by 6Scan · textwebappsphp
https://www.exploit-db.com/exploits/18355

Nuclei Templates (1)

Count Per Day <= 3.1 - download.php f Parameter Traversal Arbitrary File Access
MEDIUMby daffainfo

Scores

EPSS 0.0275
EPSS Percentile 86.0%

Details

CWE
CWE-22
Status published
Products (6)
count_per_day_project/count_per_day 2.2
count_per_day_project/count_per_day 2.15
count_per_day_project/count_per_day 2.15.1
count_per_day_project/count_per_day 2.16
tom_braider/count_per_day 1.0
tom_braider/count_per_day < 3.1
Published Jan 20, 2012
Tracked Since Feb 18, 2026