[CIVN-2026-0152] SQL Injection Vulnerability in Ally WordPress Plugin

By Published On: March 22, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


SQL Injection Vulnerability in Ally WordPress Plugin


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


WordPress Plugin Ally – Web Accessibility & Usability versions 4.0.3

Overview


A vulnerability has been reported in Ally Plugin for WordPress which could allow an attacker to execute arbitrary code on the target system.


Target Audience:

WordPress website owners, administrators, developers, and hosting providers using Ally plugin.


Risk Assessment:

High risk of unauthenticated SQL injection leading to data compromise and service disruption.

 

Impact Assessment:

Potential for data theft, unauthorized data modification, service disruption, and potential compromise of the affected system.


Description


Ally Plugin is a plugin for WordPress that helps website owners improve accessibility and usability by providing automated remediation tools and accessibility features to enhance the browsing experience for users with disabilities.


This vulnerability exists in the Ally Plugin of WordPress due to insufficient sanitization and validation of user-supplied input before it is used in SQL queries. An attacker could exploit this vulnerability by sending specially crafted HTTP requests containing malicious SQL payloads to the vulnerable parameter exposed by the plugin.


Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the target system.


Solution


Apply appropriate updates as mentioned:

https://www.wordfence.com/blog/2026/03/400000-wordpress-sites-affected-by-unauthenticated-sql-injection-vulnerability-in-ally-wordpress-plugin/



Vendor Information


WordPress

https://www.wordfence.com/blog/2026/03/400000-wordpress-sites-affected-by-unauthenticated-sql-injection-vulnerability-in-ally-wordpress-plugin/


References


 

https://www.wordfence.com/blog/2026/03/400000-wordpress-sites-affected-by-unauthenticated-sql-injection-vulnerability-in-ally-wordpress-plugin/


CVE Name

CVE-2026-2413


 




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmm/fkQACgkQ3jCgcSdc

ys+Gwg/+MtM6pdJc+gzk3Ei9Wi04rrXEfX+16gcjoTtcg2OZcfP+FUVuBB7wTqDw

/zUfGP/P0i6+9JxnW+Szbj5Xnvr3dMPllu5gSjH/LANqHjZgD/bKc7LQIG3DYGQH

eKn3Ak75vMZX/QBBeifrVRWoyz8GS4eH8FoP7c1u4Cx8wLBOJoXuiyDn1Imkrs2l

PX6O+fjzPMQUB7TrrUCn1Z1F9VBSg9xuXmyrx+YIflVTWPDJOX1yIDeS8G9UJmk5

/WCWIX4TKiXXrVT9aPTW10xtjMv4yiWaXtKBF4nuL8FXypG3rM5W3a6XRaAYyaP9

gXeBQW2+9qgnXVzPy62RUVJHxoVSHC9lUs4gLJ4gsTyxpR2uCg7SSDeUZJnUMCEZ

pVS6X/IsGY8uBQDshAuvBhNA0GRAZR5AQcpOzT7TKO/k2yBBIB/DsEFqJrUyy2Qs

ettCZUMt2uZNflv71jgCXG4guuLLwJyrQbFUprXl9nAJURETDfeaFQUUXEaXvxLo

auaZS3s8OajTXi8sF9JE5MmW0hbxoZrtHBGp6onxNpcfVnY4CNff6Yzp7BJX4EAu

kMkyPuoM6tKGXiFc2GK2UfHVP43ESbV8HYescQMLlHIpPMei3LAEsBVP2rnOCdql

6Fy8YSfupkyMNz4pSBi93XKSFZpYtOhEOBD0zLqlcMtfiGHxNew=

=tcvs

—–END PGP SIGNATURE—–

Share this article