PT-2026-3548 · WordPress · Advanced Custom Fields: Extended
Andrea Bocchetti
·
Published
2026-01-20
·
Updated
2026-02-06
·
CVE-2025-14533
CVSS v3.1
9.8
9.8
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Advanced Custom Fields: Extended Plugin
Advanced Custom Fields: Extended versions up to and including 0.9.2.1
Description
The Advanced Custom Fields: Extended plugin for WordPress has a flaw that allows unauthenticated attackers to gain administrator access. This is due to insufficient restrictions within the
insert user function, which allows attackers to assign themselves the 'administrator' role during user registration, provided the 'role' parameter is mapped to a custom field. Approximately 100,000 websites are potentially affected. The issue can be exploited by submitting a crafted registration request. The wp insert user() function is abused to escalate privileges. The vulnerability allows for full site takeover, including the ability to upload malicious plugins and backdoors. A scanning campaign targeting WordPress plugins has been detected, potentially seeking to identify vulnerable sites.Recommendations
Update to version 0.9.2.2 or later.
Disable user registration until a patch is applied.
Strip the role parameter from registration requests as a temporary mitigation.
Review recent user registrations for unauthorized administrator accounts.
Fix
LPE
Improper Privilege Management
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
CVE-2025-14533
Affected Products
Advanced Custom Fields: Extended
References · 26
- https://nvd.nist.gov/vuln/detail/CVE-2025-14533 · Security Note
- https://twitter.com/SenselearnerL/status/2013908234067697732 · Twitter Post
- https://twitter.com/VulmonFeeds/status/2013682682039857266 · Twitter Post
- https://twitter.com/TheHackerWire/status/2013559295514943627 · Twitter Post
- https://twitter.com/cracbot/status/2015379180452721146 · Twitter Post
- https://t.me/cveNotify/149256 · Telegram Post
- https://t.me/true_secator/7823 · Telegram Post
- https://twitter.com/MisbarSec/status/2013888156538380766 · Twitter Post
- https://plugins.trac.wordpress.org/browser/acf-extended/tags/0.9.2.2/includes/fields/field-user-roles.php#L437 · Note
- https://twitter.com/OstorlabSec/status/2014246453858750720 · Twitter Post
- https://plugins.trac.wordpress.org/browser/acf-extended/tags/0.9.2.1/includes/modules/form/module-form-action-user.php#L636 · Note
- https://wordfence.com/threat-intel/vulnerabilities/id/d44f8af2-3525-4b00-afa8-a908250cc838?source=cve · Note
- https://twitter.com/ThreatSynop/status/2013640963063697462 · Twitter Post
- https://twitter.com/ThreatSynop/status/2013593156877455469 · Twitter Post
- https://twitter.com/0dayPublishing/status/2013547338137063884 · Twitter Post