Security for everyone

CVE-2012-0896 Scanner

Detects 'Path Traversal' vulnerability in Count Per Day plugin for WordPress affects v. before 3.1.1.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one




Count Per Day is a very popular plugin for WordPress websites that provides valuable analytics about their visitors' behavior and website traffic. It helps website owners understand how their audience interacts with their content, where they come from, and what they are searching for. Count Per Day's colorful graphs and detailed reports make it easy to monitor website traffic and identify areas for improvement.

However, like any software, Count Per Day is not immune to vulnerabilities. CVE-2012-0896 is one such vulnerability detected in versions of the Count Per Day module prior to 3.1.1. This security flaw is an absolute path traversal vulnerability in download.php, and it allows remote attackers to read any file on a victim's server by exploiting the f parameter.

This vulnerability can lead to severe consequences if left unchecked. An attacker can exploit the vulnerability by downloading sensitive files such as database backups, configuration files, credentials, and other information that can be used to compromise the security of the website or the entire server. In the worst-case scenario, an attacker can gain administrative access to the website, steal data, and affect the integrity of the website and its users.

In conclusion, website security should never be taken lightly. It is always a good idea to be proactive and take precautions to protect digital assets. Thanks to pro features of the platform, individuals can easily and quickly identify vulnerabilities in their digital assets and take steps to secure them. By working together, we can keep our websites and data safe from harm.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture