CVE-2026-3643

Published: Apr 15, 2026 Last Modified: Apr 15, 2026
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,2
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: changed
Confidentiality: low
Integrity: low
Availability: none

Description

AI Translation Available

The Accessibly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the REST API in all versions up to, and including, 3.0.3. The plugin registers REST API endpoints at `/otm-ac/v1/update-widget-options` and `/otm-ac/v1/update-app-config` with the `permission_callback` set to `__return_true`, which means no authentication or authorization check is performed. The `updateWidgetOptions()` function in `AdminApi.php` accepts user-supplied JSON data and passes it directly to `AccessiblyOptions::updateAppConfig()`, which saves it to the WordPress options table via `update_option()` without any sanitization or validation. The stored `widgetSrc` value is later retrieved by `AssetsManager::enqueueFrontendScripts()` and passed directly to `wp_enqueue_script()` as the script URL, causing it to be rendered as a `<script>` tag on every front-end page. This makes it possible for unauthenticated attackers to inject arbitrary JavaScript that executes for all site visitors by changing the `widgetSrc` option to point to a malicious external script.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0008
Percentile
0,2th
Updated

EPSS Score Trend (Last 2 Days)

79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Stable
Common Consequences
Security Scopes Affected:
Access Control Confidentiality Integrity Availability
Potential Impacts:
Bypass Protection Mechanism Read Application Data Execute Unauthorized Code Or Commands
Applicable Platforms
Technologies: AI/ML, Web Based, Web Server
View CWE Details
https://plugins.trac.wordpress.org/browser/otm-accessibly/tags/3.0.3/public/adm…
https://plugins.trac.wordpress.org/browser/otm-accessibly/tags/3.0.3/public/Api…
https://plugins.trac.wordpress.org/browser/otm-accessibly/tags/3.0.3/public/Ass…
https://plugins.trac.wordpress.org/browser/otm-accessibly/tags/3.0.3/public/Dat…
https://plugins.trac.wordpress.org/browser/otm-accessibly/trunk/public/admin/Ad…
https://plugins.trac.wordpress.org/browser/otm-accessibly/trunk/public/Api/Base…
https://plugins.trac.wordpress.org/browser/otm-accessibly/trunk/public/AssetsMa…
https://plugins.trac.wordpress.org/browser/otm-accessibly/trunk/public/Data/Acc…
https://www.wordfence.com/threat-intel/vulnerabilities/id/f8234ea2-ff80-425f-b8…