Input validation vulnerability in Simple Download Counter 1.6

The Simple Download Counter plugin for WordPress is vulnerable to a type of attack called Stored Cross-Site Scripting. This type of attack is possible in versions of the plugin up to and including version 1.6. The attack is made possible because the plugin doesn’t properly check user supplied information (such as ‘before’ and ‘after’ attributes) and doesn’t escape dangerous characters. An attacker with Contributor-level permissions or higher on the WordPress site can inject malicious web scripts into pages which will be run whenever a user accesses the page.

Detected in:

Simple Download Counter fixed vulnerable versions: >= 1.6 <= 1.6

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.