Advanced Custom Fields: Extended <0.9.1.1 - RCE
Title source: llmDescription
The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Remote Code Execution in versions 0.9.0.5 through 0.9.1.1 via the prepare_form() function. This is due to the function accepting user input and then passing that through call_user_func_array(). This makes it possible for unauthenticated attackers to execute arbitrary code on the server, which can be leveraged to inject backdoors or create new administrative user accounts.
Exploits (9)
nomisec
WORKING POC
2 stars
by MataKucing-OFC · remote
https://github.com/MataKucing-OFC/CVE-2025-13486
github
SUSPICIOUS
2 stars
by lasthero-887 · poc
https://github.com/lasthero-887/CVE-2025-13486---Poc
nomisec
WORKING POC
1 stars
by whattheslime · infoleak
https://github.com/whattheslime/CVE-2025-13486-exploit
metasploit
WORKING POC
EXCELLENT
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_acf_extended_rce.rb
Nuclei Templates (1)
Advanced Custom Fields Extended < 0.9.2 - Remote Code Execution
CRITICALVERIFIEDby 0xanis
Shodan:
http.component:"WordPress"
FOFA:
body="wp-content/plugins/acf-extended"
Scores
CVSS v3
9.8
EPSS
0.7268
EPSS Percentile
98.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lab Environment
Details
VulnCheck KEV
2025-12-02
CWE
CWE-94
Status
published
Products (1)
hwk-fr/Advanced Custom Fields: Extended
0.9.0.5 - 0.9.1.1
Published
Dec 03, 2025
Tracked Since
Feb 18, 2026