### [CVE-2021-24226](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24226) ![](https://img.shields.io/static/v1?label=Product&message=AccessAlly&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=3.5.6%3E%3D%203.5.6%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Information%20Exposure&color=brighgreen) ### Description In the AccessAlly WordPress plugin before 3.5.7, the file "resource/frontend/product/product-shortcode.php" responsible for the [accessally_order_form] shortcode is dumping serialize($_SERVER), which contains all environment variables. The leakage occurs on all public facing pages containing the [accessally_order_form] shortcode, no login or administrator role is required. ### POC #### Reference - https://wpscan.com/vulnerability/8e3e89fd-e380-4108-be23-00e87fbaad16 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates