Security vulnerability in "Ally" WordPress Plugin affects 400.000 websites

Attackers can execute their own commands via a vulnerability in the WordPress plugin "Ally". Admins should install the security patch.

listen Print view
A symbolic update button on a keyboard.

(Image: Tatiana Popova/Shutterstock.com)

1 min. read

Due to a security vulnerability, attackers can attack WordPress websites on which the plugin "Ally – Web Accessibility & Usability" is installed. So far, there are no reports that attackers are already exploiting the vulnerability.

Security researchers from Wordfence report on the vulnerability (CVE-2026-2413, risk "high") in a post. Due to insufficient checks, attackers can execute their own SQL commands without authentication via prepared URLs. If such an attack is successful, attackers gain access to actually isolated data such as password hashes.

Videos by heise

As can be seen from the plugin website, Ally has 400.000 active installations. These websites are potentially vulnerable. The developers assure that the vulnerability in Ally – Web Accessibility & Usability 4.1.0 has been closed. All versions up to and including 4.0.3 are said to be threatened.

The security researchers state that the vulnerability was reported in early February via their bug bounty program. The developers then released the security update at the end of February.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.