WP Visitor Statistics (Real Time Traffic)

Information

Software Type Plugin
Software Slug wp-stats-manager (view on wordpress.org)
Software Status Active
Software Author osamaesh
Software Website plugins-market.com
Software Downloads 610,649
Software Active Installs 20,000
Software Record Last Updated June 23, 2024

7 Vulnerabilities

Title Status CVE ID CVSS Researchers Date
WP Visitor Statistics (Real Time Traffic) <= 6.9.4 - Sensitive Information Exposure via Log File Patched CVE-2024-24867 5.3 beluga February 2, 2024
WP Visitor Statistics (Real Time Traffic) <= 6.8.1 - Unauthenticated SQL Injection Patched CVE-2023-0600 9.8 Trần Quốc Trường An April 24, 2023
WP Visitor Statistics (Real Time Traffic) <= 6.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Patched CVE-2022-4656 6.4 István Márton January 17, 2023
WP Visitor Statistics (Real Time Traffic) <= 5.7 - Unauthenticated SQL Injection Patched CVE-2022-33965 9.8 Rafie Muhammad July 6, 2022
WP Visitor Statistics (Real Time Traffic) <= 5.5 - SQL Injection Patched CVE-2022-0410 8.8 Krzysztof Zając February 14, 2022
WP Visitor Statistics (Real Time Traffic) <= 5.4 - Missing Authorization to Stored Cross-Site Scripting Patched CVE-2021-25042 5.4 Krzysztof Zając January 31, 2022
WP Visitor Statistics (Real Time Traffic) <= 4.7 - SQL Injection Patched CVE-2021-24750 8.8 Ron Jost (Hacker5preme) December 22, 2021

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation