AccessAlly WordPress plugin versions prior to 3.3.2 contain an unauthenticated arbitrary PHP code execution vulnerability in the Login Widget. The plugin processes the login_error parameter as PHP code, allowing an attacker to supply and execute arbitrary PHP in the context of the WordPress web server process, resulting in remote code execution.
History

Fri, 09 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 09 Jan 2026 17:00:00 +0000

Type Values Removed Values Added
Description AccessAlly WordPress plugin versions prior to 3.3.2 contain an unauthenticated arbitrary PHP code execution vulnerability in the Login Widget. The plugin processes the login_error parameter as PHP code, allowing an attacker to supply and execute arbitrary PHP in the context of the WordPress web server process, resulting in remote code execution.
Title AccessAlly < 3.3.2 Unauthenticated Arbitrary PHP Code Execution
Weaknesses CWE-94
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-09T18:36:57.869Z

Reserved: 2025-10-30T15:45:57.764Z

Link: CVE-2020-36875

cve-icon Vulnrichment

Updated: 2026-01-09T17:46:52.858Z

cve-icon NVD

Status : Received

Published: 2026-01-09T17:15:50.263

Modified: 2026-01-09T19:16:02.453

Link: CVE-2020-36875

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.