VYPR
Medium severity4.3NVD Advisory· Published Oct 16, 2025· Updated Apr 15, 2026

CVE-2025-10700

CVE-2025-10700

Description

The Ally – Web Accessibility & Usability plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.8.0. This is due to missing or incorrect nonce validation on the enable_unfiltered_files_upload function. This makes it possible for unauthenticated attackers to enable unfiltered file upload and add svg files to the upload list via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CSRF in Ally plugin (≤3.8.0) lets attackers trick admins into enabling unfiltered SVG uploads, increasing XSS risk.

Vulnerability

Overview

The Ally – Web Accessibility & Usability plugin for WordPress (versions up to and including 3.8.0) contains a Cross-Site Request Forgery (CSRF) vulnerability in the enable_unfiltered_files_upload function. The plugin fails to validate a nonce when processing the AJAX action ea11y_svg_upload, which is responsible for enabling unfiltered file uploads and adding SVG files toggling SVG support in the upload list [1]. This missing or incorrect nonce validation allows an attacker to forge requests on behalf of an authenticated administrator [1].

Exploitation

Prerequisites

To exploit this vulnerability, an attacker must trick a logged-in site administrator into performing an action such as clicking a malicious link or visiting a crafted page while logged into the WordPress admin panel. The vulnerable AJAX handler does check that the user has the manage_options capability, but because no CSRF nonce is required, an unauthenticated attacker can still trigger the state change by luring an admin to a hostile site [1]. No additional authentication or network access is needed beyond the admin's session is needed.

Impact

Successful exploitation enables unfiltered file uploads and adds SVG files to the allowed upload list. Since SVG files can contain embedded JavaScript and other interactive content, this weakens the site's security posture and increases the risk of stored cross-site scripting (XSS) attacks, data smuggling, and other content-based abuses [1].

Mitigation

The vendor has not yet released a patched version. As of the publication date, all versions up to and including 3.8.0 are affected. Site administrators should consider disabling the plugin or applying a Web Application Firewall (WAF) rule to block forged requests to the ea11y_svg_upload AJAX action until an official fix is available [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.