AccessAlly WordPress plugin versions prior to 3.3.2 contain an unauthenticated arbitrary PHP code execution vulnerability in the Login Widget. The plugin processes the login_error parameter as PHP code, allowing an attacker to supply and execute arbitrary PHP in the context of the WordPress web server process, resulting in remote code execution.
Metrics
Affected Vendors & Products
References
History
Mon, 12 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Accessally
Accessally accessally Wordpress Wordpress wordpress |
|
| Vendors & Products |
Accessally
Accessally accessally Wordpress Wordpress wordpress |
Fri, 09 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 09 Jan 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AccessAlly WordPress plugin versions prior to 3.3.2 contain an unauthenticated arbitrary PHP code execution vulnerability in the Login Widget. The plugin processes the login_error parameter as PHP code, allowing an attacker to supply and execute arbitrary PHP in the context of the WordPress web server process, resulting in remote code execution. | |
| Title | AccessAlly < 3.3.2 Unauthenticated Arbitrary PHP Code Execution | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-01-09T16:41:06.883Z
Updated: 2026-01-09T18:36:57.869Z
Reserved: 2025-10-30T15:45:57.764Z
Link: CVE-2020-36875
Updated: 2026-01-09T17:46:52.858Z
Status : Awaiting Analysis
Published: 2026-01-09T17:15:50.263
Modified: 2026-01-13T14:03:46.203
Link: CVE-2020-36875
No data.