CVE-2025-13486

CRITICAL EXPLOITED NUCLEI

Advanced Custom Fields: Extended <0.9.1.1 - RCE

Title source: llm

Description

The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Remote Code Execution in versions 0.9.0.5 through 0.9.1.1 via the prepare_form() function. This is due to the function accepting user input and then passing that through call_user_func_array(). This makes it possible for unauthenticated attackers to execute arbitrary code on the server, which can be leveraged to inject backdoors or create new administrative user accounts.

Exploits (8)

nomisec WORKING POC 4 stars
by 0xanis · remote
https://github.com/0xanis/CVE-2025-13486-POC
nomisec WORKING POC 2 stars
by 0xgh057r3c0n · remote
https://github.com/0xgh057r3c0n/CVE-2025-13486
nomisec WORKING POC 2 stars
by MataKucing-OFC · remote
https://github.com/MataKucing-OFC/CVE-2025-13486
github SUSPICIOUS 2 stars
by lasthero-887 · poc
https://github.com/lasthero-887/CVE-2025-13486---Poc
nomisec WORKING POC 1 stars
by whattheslime · infoleak
https://github.com/whattheslime/CVE-2025-13486-exploit
nomisec WORKING POC
by KrE80r · poc
https://github.com/KrE80r/cve-2025-13486-vuln-setup
nomisec STUB
by 0xnemian · poc
https://github.com/0xnemian/CVE-2025-13486.-CVE-2025-13486
metasploit WORKING POC EXCELLENT
by Marcin Dudek (dudekmar) - CERT.PL, Valentin Lobstein <[email protected]> · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_acf_extended_rce.rb

Nuclei Templates (1)

Advanced Custom Fields Extended < 0.9.2 - Remote Code Execution
CRITICALVERIFIEDby 0xanis
Shodan: http.component:"WordPress"
FOFA: body="wp-content/plugins/acf-extended"

Scores

CVSS v3 9.8
EPSS 0.7525
EPSS Percentile 98.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2025-12-02

Classification

CWE
CWE-94
Status draft

Timeline

Published Dec 03, 2025
Tracked Since Feb 18, 2026