
[CIVN-2026-0152] SQL Injection Vulnerability in Ally WordPress Plugin
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
SQL Injection Vulnerability in Ally WordPress Plugin
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
WordPress Plugin Ally – Web Accessibility & Usability versions 4.0.3
Overview
A vulnerability has been reported in Ally Plugin for WordPress which could allow an attacker to execute arbitrary code on the target system.
Target Audience:
WordPress website owners, administrators, developers, and hosting providers using Ally plugin.
Risk Assessment:
High risk of unauthenticated SQL injection leading to data compromise and service disruption.
Impact Assessment:
Potential for data theft, unauthorized data modification, service disruption, and potential compromise of the affected system.
Description
Ally Plugin is a plugin for WordPress that helps website owners improve accessibility and usability by providing automated remediation tools and accessibility features to enhance the browsing experience for users with disabilities.
This vulnerability exists in the Ally Plugin of WordPress due to insufficient sanitization and validation of user-supplied input before it is used in SQL queries. An attacker could exploit this vulnerability by sending specially crafted HTTP requests containing malicious SQL payloads to the vulnerable parameter exposed by the plugin.
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the target system.
Solution
Apply appropriate updates as mentioned:
https://www.wordfence.com/blog/2026/03/400000-wordpress-sites-affected-by-unauthenticated-sql-injection-vulnerability-in-ally-wordpress-plugin/
Vendor Information
WordPress
https://www.wordfence.com/blog/2026/03/400000-wordpress-sites-affected-by-unauthenticated-sql-injection-vulnerability-in-ally-wordpress-plugin/
References
https://www.wordfence.com/blog/2026/03/400000-wordpress-sites-affected-by-unauthenticated-sql-injection-vulnerability-in-ally-wordpress-plugin/
CVE Name
CVE-2026-2413
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=tcvs
—–END PGP SIGNATURE—–


