AccessAlly WordPress plugin versions prior to 3.3.2 contain an unauthenticated arbitrary PHP code execution vulnerability in the Login Widget. The plugin processes the login_error parameter as PHP code, allowing an attacker to supply and execute arbitrary PHP in the context of the WordPress web server process, resulting in remote code execution.
History

Mon, 12 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Accessally
Accessally accessally
Wordpress
Wordpress wordpress
Vendors & Products Accessally
Accessally accessally
Wordpress
Wordpress wordpress

Fri, 09 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 09 Jan 2026 17:00:00 +0000

Type Values Removed Values Added
Description AccessAlly WordPress plugin versions prior to 3.3.2 contain an unauthenticated arbitrary PHP code execution vulnerability in the Login Widget. The plugin processes the login_error parameter as PHP code, allowing an attacker to supply and execute arbitrary PHP in the context of the WordPress web server process, resulting in remote code execution.
Title AccessAlly < 3.3.2 Unauthenticated Arbitrary PHP Code Execution
Weaknesses CWE-94
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2026-01-09T16:41:06.883Z

Updated: 2026-01-09T18:36:57.869Z

Reserved: 2025-10-30T15:45:57.764Z

Link: CVE-2020-36875

cve-icon Vulnrichment

Updated: 2026-01-09T17:46:52.858Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-09T17:15:50.263

Modified: 2026-01-13T14:03:46.203

Link: CVE-2020-36875

cve-icon Redhat

No data.