CVE-2025-13486
Published: 03 December 2025
Description
The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Remote Code Execution in versions 0.9.0.5 through 0.9.1.1 via the prepare_form() function. This is due to the function accepting user input and then passing that through call_user_func_array(). This makes…
more
it possible for unauthenticated attackers to execute arbitrary code on the server, which can be leveraged to inject backdoors or create new administrative user accounts.
Mitigating Controls (NIST 800-53 r5)AI
Directly enforces validation of unsanitized user input to the prepare_form() function before passing to call_user_func_array(), preventing arbitrary PHP code execution.
Mandates timely flaw remediation by patching the vulnerable Advanced Custom Fields: Extended plugin versions 0.9.0.5 through 0.9.1.1 as detailed in the provided mitigation changeset.
Vulnerability scanning identifies the presence of CVE-2025-13486 in installed WordPress plugins, enabling proactive remediation.
Security SummaryAI
CVE-2025-13486 is a remote code execution vulnerability in the Advanced Custom Fields: Extended plugin for WordPress, affecting versions 0.9.0.5 through 0.9.1.1. The flaw originates in the prepare_form() function, which accepts unsanitized user input and passes it directly to call_user_func_array(), allowing arbitrary PHP code execution. Published on 2025-12-03, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-94 (Improper Control of Generation of Code).
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction. Exploitation enables arbitrary code execution on the affected server, which attackers can use to inject persistent backdoors or create new administrative user accounts, potentially compromising the entire WordPress installation.
Mitigation details are provided in the WordPress plugin trac changeset at https://plugins.trac.wordpress.org/changeset/3400134/acf-extended, which addresses the issue. Additional threat intelligence, including exploitation vectors, is available from Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/c508cb73-53e6-4ebe-b3d0-285908b722c9?source=cve.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote code execution vulnerability in a public-facing WordPress plugin directly enables T1190: Exploit Public-Facing Application.