Home News Critical SQL Injection Flaw in Ally WordPress Plugin Leaves Over 200,000 Websites Exposed
News

Critical SQL Injection Flaw in Ally WordPress Plugin Leaves Over 200,000 Websites Exposed

SQL Injection Vulnerability in Ally WordPress Plugin Exposes Over 200,000 Websites

A newly discovered security flaw in the popular WordPress plugin Ally is putting hundreds of thousands of websites at risk of database attacks, despite a security patch already being available.

Security researchers from Wordfence revealed that the vulnerability affects the Ally plugin, which is installed on more than 400,000 websites running WordPress. The flaw is an SQL injection vulnerability that can be exploited remotely without requiring attackers to log into a website.

The vulnerability, identified as CVE-2026-2413, allows attackers to manipulate database queries and extract sensitive information stored within a site’s database.

How the Vulnerability Works

The issue stems from how the plugin processes certain URL parameters. Instead of properly validating and filtering user input before sending it to the database, the plugin allows malicious SQL commands to be inserted into queries.

By crafting a specially designed URL, attackers can trigger unauthorized database requests. Researchers say attackers can exploit the flaw using time-based blind SQL injection techniques, which rely on delayed server responses to slowly extract database information.

This method can reveal sensitive data such as administrator accounts, email addresses, password hashes, and other confidential records stored in the website database.

Patch Released but Many Sites Remain Vulnerable

Developers of the Ally plugin addressed the issue in version 4.1.0, which was released on February 23. The update fixes the vulnerability by correcting the way database queries are handled.

However, the adoption of the update has been slow. According to researchers, around 60% of websites using the plugin were still running vulnerable versions as of March 11. That means more than 200,000 sites remain exposed to potential attacks.

Why SQL Injection Vulnerabilities Still Occur

Despite being one of the oldest web security flaws, SQL injection continues to appear in modern applications. According to Yagub Rahimov, CEO of Polygraf AI, the vulnerability highlights a common development mistake.

He explained that developers often directly insert user input into database queries instead of using safer techniques such as parameterized statements. WordPress itself already provides built-in protections to prevent these issues.

Rahimov noted that the platform offers the wpdb prepare() function specifically designed to prevent SQL injection attacks, but it was not used in this case.

If attackers exploit the vulnerability, they may gain access to the entire WordPress database, including user accounts, email addresses, hashed passwords, and other sensitive information.

He also warned that the flaw is particularly dangerous because it requires no authentication. Anyone can launch the attack simply by sending a crafted URL request, and the process can be automated using common SQL injection tools.

What Website Owners Should Do

Website administrators using WordPress with the Ally plugin are strongly advised to update immediately to version 4.1.0 or later. Installing the latest update closes the SQL injection vulnerability and prevents attackers from abusing the flawed query handling.

Security experts also recommend that organizations review and audit the type of data stored in their WordPress databases. Sites that previously ran vulnerable versions should consider the possibility that sensitive data may already have been accessed and take appropriate security measures.

1 Comment

  • This vulnerability highlights how even well-known and widely used WordPress plugins can introduce serious security risks if not properly maintained or updated. Website administrators should treat plugin updates as a priority, especially when patches address critical issues like SQL injection. Regular security audits and timely updates are essential to prevent data exposure and protect both website owners and users.

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles

News

Interpol-Led Global Cybercrime Crackdown Dismantles 45,000 Malicious IPs and Arrests Dozens

Interpol and Global Partners Shut Down 45,000 Malicious IPs in Cybercrime Crackdown...

News

Iran-Linked Handala Hackers Claim Massive Cyberattack on Stryker While Verifone Denies Breach

An Iran-linked hacking group known as Handala Hack Team has claimed responsibility...

News

Iran-Linked MuddyWater Hackers Target U.S. Networks with New Dindoor Backdoor Amid Rising Tensions

Security researchers have uncovered a new cyber campaign by an Iran-linked threat...

News

Iran-Linked Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware Campaign

A suspected Iran-linked threat group has been tied to a cyber-espionage campaign...