ACF Plugin Flaw Grants Hackers Administrator Access to 50,000 WordPress Sites

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

Severe Vulnerability Discovered in ACF Extended Plugin for WordPress

A critical vulnerability has been identified within the Advanced Custom Fields: Extended (ACF Extended) plugin, enabling unauthenticated attackers to remotely gain administrative permissions on WordPress sites.

This plugin, which currently operates on approximately 100,000 websites, is designed to enhance the functionalities of the standard Advanced Custom Fields (ACF) plugin, providing additional tools for developers and sophisticated site builders.

Designated as CVE-2025-14533, this security flaw can be exploited through the ‘Insert User / Update User’ form action in versions 0.9.2.1 and earlier of ACF Extended. Attackers exploiting this vulnerability can attain admin privileges without proper authorization.

The issue stems from a failure to enforce role restrictions during the user creation or update processes. Notably, exploitation remains feasible even when role limitations are precisely configured in the field settings.

“In the vulnerable version [of the plugin], there are no restrictions for form fields, allowing the user’s role to be set arbitrarily, including ‘administrator,’ independent of field settings, provided a role field is included in the form,” explains Wordfence.

Research indicates that this privilege escalation vulnerability could lead to total site compromise. However, it should be noted that the vulnerability is exploitable solely on sites utilizing a ‘Create User’ or ‘Update User’ form with a mapped role field.

Security researcher Andrea Bocchetti uncovered CVE-2025-14533 and reported the issue to Wordfence on December 10, 2025, prompting an elevation of the report to the vendor.

The vendor promptly remedied the shortcoming, issuing ACF Extended version 0.9.2.2 just four days later.

According to data from wordpress.org, approximately 50,000 users have downloaded the updated plugin since its release. If all downloads corresponded to the latest version, around another 50,000 sites would remain vulnerable to potential attacks.

Monitoring Activity Surrounding WordPress Plugins

While no direct attacks exploiting CVE-2025-14533 have been documented thus far, a report by the threat intelligence firm GreyNoise reveals extensive reconnaissance activities targeting susceptible WordPress plugins.

From late October 2025 through mid-January 2026, nearly 1,000 IP addresses spanning 145 Autonomous System Numbers (ASNs) engaged in approximately 40,000 unique enumeration events, documenting attempts to identify vulnerable installations of 706 different WordPress plugins.

Blue circle icon with two interlocking plugs, one featuring the WordPress logo, symbolizing WordPress plugins or connectivity.

The most scrutinized plugins during this period include Post SMTP, Loginizer, LiteSpeed Cache, SEO by Rank Math, Elementor, and Duplicator.

Additionally, in early November 2025, Wordfence noted active exploitation of the Post SMTP vulnerability, CVE-2025-11833, which was targeted by 91 distinct IP addresses.

GreyNoise also advised administrators to address CVE-2024-28000, affecting LiteSpeed Cache, which was flagged as actively exploited by Wordfence in August 2024.

Source link: Bleepingcomputer.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

RS Web Solutions

We provide the best tutorials, reviews, and recommendations on all technology and open-source web-related topics. Surf our site to extend your knowledge base on the latest web trends.
Share the Love
Related News Worth Reading