Affected products: Count Per Day 3.x (plugin for WordPress)
Affected versions: WordPress Count Per Day version to 3.2.3.
Description:
The vulnerability allows malicious people to conduct XSS attacks.
The vulnerability is caused due to insufficient input validation in the search bar. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.
Manufacturer URL: http://wordpress.org/extend/plugins/count-per-day/
Solution: Install the latest version 3.2.3 from the manufacturer.
links:
http://wordpress.org/extend/plugins/count-per-day/changelog/
http://www.n0lab.com/?p=163