Severe Vulnerability Discovered in ACF Plugin: Role Escalation to Administrator
- Critical vulnerability identified in the Advanced Custom Fields: Extended plugin
- Approximately 50,000 WordPress sites remain susceptible despite the patch
- No instances of exploitation reported thus far, but vigilance is necessary
Roughly 50,000 WordPress websites are jeopardized by a critical vulnerability recently unearthed in a widely-used plugin.
In mid-December 2025, the security researcher Andrea Bocchetti alerted Wordfence to a significant flaw in the Advanced Custom Fields: Extended plugin, which augments functionality for the original Advanced Custom Fields (ACF) plugin.
This foundational plugin enables users to enhance posts and pages with custom fields and boasts an active user base of around 100,000 WordPress sites.
Mitigation Strategies
Bocchetti elucidated that the vulnerability originates from ineffective enforcement of role restrictions during form-based user creation or updates.
“In the flawed iteration, form fields lacked proper restrictions, allowing users to assign their roles arbitrarily, including ‘administrator’, irrespective of field settings, if a role field was present in the form,” Wordfence noted in its advisory.
“Such privilege escalation vulnerabilities can lead to complete site compromise.”
In essence, any unauthenticated user can potentially elevate their permissions to admin status, effectively seizing control of a WordPress site.
The flaw is identified in versions 0.9.2.1 and earlier, and is cataloged as CVE-2025-14533, with a severity rating of 9.8/10, categorized as critical.
Conversely, the exploit requires specific conditions: sites must utilize a ‘Create User’ or ‘Update User’ form with a mapped role field.
A fix was implemented in version 0.9.2.2. According to WordPress statistics, around 50,000 sites have updated to the latest version, thereby leaving a similar number still vulnerable.

As of this moment, no confirmed cases of exploitation have surfaced, but the immediate dissemination of this information raises concerns that cybercriminals may soon begin probing for vulnerabilities.
Source link: Techradar.com.





