CVE-2026-24629
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ability, Inc Web Accessibility with Max Access accessibility-toolbar allows Stored XSS.This issue affects Web Accessibility with Max Access: from n/a through <= 2.1.0.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS vulnerability in the WordPress Web Accessibility with Max Access plugin up to version 2.1.0 allows authenticated attackers to inject arbitrary scripts, which execute when visitors view the compromised page.
Vulnerability
Description
The Web Accessibility with Max Access plugin for WordPress (by Ability, Inc) suffers from a stored cross-site scripting (XSS) vulnerability in versions up to and including 2.1.0. The root cause is improper neutralization of user-supplied input during web page generation [1]. This allows an authenticated user with elevated privileges (e.g., an administrator or similar role) to inject arbitrary HTML and JavaScript code into the accessibility-toolbar functionality.
Exploitation
Conditions
To exploit this vulnerability, an attacker must have legitimate access to the WordPress admin area with sufficient permissions to modify the plugin's settings or content. The attack does not require direct user interaction for the initial injection, but successful execution of the injected script depends on a site visitor or administrator triggering the affected page (e.g., by viewing the toolbar or a page containing the injected payload) [1]. This type of vulnerability is often targeted in mass-exploit campaigns, where attackers automate the abuse of thousands of sites simultaneously.
Impact
An attacker can inject malicious scripts that run in the browser of any user who visits a page containing the stored payload. This can be used to redirect visitors to malicious websites, display unauthorized advertisements, steal session cookies, or perform other client-side attacks [1]. The CVSS v3 base score is 5.9 (Medium), reflecting the need for authenticated access but the potential for broad impact on site visitors.
Mitigation
The vendor recommends updating the plugin to a version newer than 2.1.0 as soon as possible. For sites that cannot be updated immediately, administrators should restrict plugin editing privileges to trusted users only and consider using a web application firewall to help block XSS payloads [1]. No official workaround has been provided beyond removal or upgrade.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=2.1.0
- Range: <= 2.1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.