AccessAlly WordPress plugin versions prior to 3.3.2 contain an unauthenticated arbitrary PHP code execution vulnerability in the Login Widget. The plugin processes the login_error parameter as PHP code, allowing an attacker to supply and execute arbitrary PHP in the context of the WordPress web server process, resulting in remote code execution.
Metrics
Affected Vendors & Products
References
History
Fri, 09 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 09 Jan 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AccessAlly WordPress plugin versions prior to 3.3.2 contain an unauthenticated arbitrary PHP code execution vulnerability in the Login Widget. The plugin processes the login_error parameter as PHP code, allowing an attacker to supply and execute arbitrary PHP in the context of the WordPress web server process, resulting in remote code execution. | |
| Title | AccessAlly < 3.3.2 Unauthenticated Arbitrary PHP Code Execution | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-09T18:36:57.869Z
Reserved: 2025-10-30T15:45:57.764Z
Link: CVE-2020-36875
Updated: 2026-01-09T17:46:52.858Z
Status : Received
Published: 2026-01-09T17:15:50.263
Modified: 2026-01-09T19:16:02.453
Link: CVE-2020-36875
No data.
OpenCVE Enrichment
No data.