Description
WordPress Plugin AccessAlly is prone to a vulnerability that lets remote attackers execute arbitrary code because the application fails to sanitize user-supplied input. Attackers can exploit this issue to execute arbitrary PHP code within the context of the affected webserver process. WordPress Plugin AccessAlly version 3.3.1 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 3.3.2 or latest
References
Related Vulnerabilities
Contao Incorrect Default Permissions Vulnerability (CVE-2019-19712)
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0127)
MySQL CVE-2012-0583 Vulnerability (CVE-2012-0583)
WordPress 4.2.x Multiple Vulnerabilities (4.2 - 4.2.35)
WordPress Plugin CF7 Invisible reCAPTCHA Cross-Site Request Forgery (1.3.3)