CVE-2025-13486
CRITICAL EXPLOITED NUCLEIAdvanced Custom Fields: Extended <0.9.1.1 - RCE
Title source: llmDescription
The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Remote Code Execution in versions 0.9.0.5 through 0.9.1.1 via the prepare_form() function. This is due to the function accepting user input and then passing that through call_user_func_array(). This makes it possible for unauthenticated attackers to execute arbitrary code on the server, which can be leveraged to inject backdoors or create new administrative user accounts.
Exploits (8)
nomisec
WORKING POC
2 stars
by MataKucing-OFC · remote
https://github.com/MataKucing-OFC/CVE-2025-13486
github
SUSPICIOUS
2 stars
by lasthero-887 · poc
https://github.com/lasthero-887/CVE-2025-13486---Poc
nomisec
WORKING POC
1 stars
by whattheslime · infoleak
https://github.com/whattheslime/CVE-2025-13486-exploit
metasploit
WORKING POC
EXCELLENT
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_acf_extended_rce.rb
Nuclei Templates (1)
Advanced Custom Fields Extended < 0.9.2 - Remote Code Execution
CRITICALVERIFIEDby 0xanis
Shodan:
http.component:"WordPress"
FOFA:
body="wp-content/plugins/acf-extended"
Scores
CVSS v3
9.8
EPSS
0.7525
EPSS Percentile
98.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2025-12-02
Classification
CWE
CWE-94
Status
draft
Timeline
Published
Dec 03, 2025
Tracked Since
Feb 18, 2026