Cyber Posture

CVE-2025-13486

Critical

Published: 03 December 2025

Published
03 December 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.6687 98.6th percentile
Risk Priority 60 60% EPSS · 20% KEV · 20% CVSS

Description

The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Remote Code Execution in versions 0.9.0.5 through 0.9.1.1 via the prepare_form() function. This is due to the function accepting user input and then passing that through call_user_func_array(). This makes…

more

it possible for unauthenticated attackers to execute arbitrary code on the server, which can be leveraged to inject backdoors or create new administrative user accounts.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly enforces validation of unsanitized user input to the prepare_form() function before passing to call_user_func_array(), preventing arbitrary PHP code execution.

prevent

Mandates timely flaw remediation by patching the vulnerable Advanced Custom Fields: Extended plugin versions 0.9.0.5 through 0.9.1.1 as detailed in the provided mitigation changeset.

detect

Vulnerability scanning identifies the presence of CVE-2025-13486 in installed WordPress plugins, enabling proactive remediation.

Security SummaryAI

CVE-2025-13486 is a remote code execution vulnerability in the Advanced Custom Fields: Extended plugin for WordPress, affecting versions 0.9.0.5 through 0.9.1.1. The flaw originates in the prepare_form() function, which accepts unsanitized user input and passes it directly to call_user_func_array(), allowing arbitrary PHP code execution. Published on 2025-12-03, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-94 (Improper Control of Generation of Code).

Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction. Exploitation enables arbitrary code execution on the affected server, which attackers can use to inject persistent backdoors or create new administrative user accounts, potentially compromising the entire WordPress installation.

Mitigation details are provided in the WordPress plugin trac changeset at https://plugins.trac.wordpress.org/changeset/3400134/acf-extended, which addresses the issue. Additional threat intelligence, including exploitation vectors, is available from Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/c508cb73-53e6-4ebe-b3d0-285908b722c9?source=cve.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Unauthenticated remote code execution vulnerability in a public-facing WordPress plugin directly enables T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References