PT-2026-33020 · Onthemapmarketing · Accessibly – Wordpress Website Accessibility
Ronnachai Chaipha
+1
·
Published
2026-04-15
·
Updated
2026-04-15
·
CVE-2026-3643
CVSS v3.1
7.2
High
| AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N |
The Accessibly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the REST API in all versions up to, and including, 3.0.3. The plugin registers REST API endpoints at
/otm-ac/v1/update-widget-options and /otm-ac/v1/update-app-config with the permission callback set to return true, which means no authentication or authorization check is performed. The updateWidgetOptions() function in AdminApi.php accepts user-supplied JSON data and passes it directly to AccessiblyOptions::updateAppConfig(), which saves it to the WordPress options table via update option() without any sanitization or validation. The stored widgetSrc value is later retrieved by AssetsManager::enqueueFrontendScripts() and passed directly to wp enqueue script() as the script URL, causing it to be rendered as a <script> tag on every front-end page. This makes it possible for unauthenticated attackers to inject arbitrary JavaScript that executes for all site visitors by changing the widgetSrc option to point to a malicious external script.Fix
XSS
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Accessibly – Wordpress Website Accessibility