Impact
The Accessibility Suite by Ability, Inc plugin for WordPress is vulnerable to SQL Injection through the 'scan_id' parameter. The flaw is caused by insufficient escaping and the absence of prepared statements, allowing an attacker to append arbitrary SQL queries to existing statements. The vulnerability is an injection flaw (CWE-89) that exposes sensitive database contents to authenticated users with Subscriber level or higher.
Affected Systems
Onlineada’s Accessibility Suite by Ability, Inc plugin for WordPress, all versions up to and including 4.20.
Risk and Exploitability
The CVSS score of 6.5 indicates a moderate severity. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires a valid authenticated account with Subscriber or higher privileges, a level of access that is commonly assigned to many users of WordPress sites. Once exploited, an attacker can extract confidential data from the database, posing a significant confidentiality risk. The risk remains moderate to high due to the prevalence of Subscriber role across installations and the absence of an immediate public exploit.
OpenCVE Enrichment