Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
DAEMON Tools Hacked: Supply Chain Attack Software Deliver
May 5, 2026
AiTM Attack: Code of Conduct Phishing Emails Target
May 5, 2026
Attackers Abuse Amazon SES for Authenticated Ph Send Phishing
May 5, 2026
Home/Threats/Critical WordPress Plugin Flaw Exposes 1 Vulnerability Sites
Threats

Critical WordPress Plugin Flaw Exposes 1 Vulnerability Sites

A critical security flaw in the popular Advanced Custom Fields: Extended WordPress plugin has put more than 100,000 websites at risk of full takeover. The vulnerability, tracked as CVE-2025-14533,...

Emy Elsamnoudy
Emy Elsamnoudy
January 20, 2026 3 Min Read
0 0

A critical security flaw in the popular Advanced Custom Fields: Extended WordPress plugin has put more than 100,000 websites at risk of full takeover.

The vulnerability, tracked as CVE-2025-14533, affects plugin versions up to and including 0.9.2.1 and carries a CVSS score of 9.8 (Critical).

If left unpatched, it allows an unauthenticated attacker to gain administrator-level access on vulnerable sites by abusing the way user registration forms handle roles.

The issue stems from how the plugin manages user creation through custom forms. Site owners can build registration or profile forms using field groups that collect data such as username, email, password, and user role.

Under normal conditions, role selection should be tightly controlled so that only safe roles, like subscriber, are available to new users. In the vulnerable versions, this control breaks down, opening the door to abuse.

Wordfence analysts identified that the plugin’s insert_user form action does not properly restrict which roles can be assigned during registration when a role field is mapped.

This oversight means an attacker can submit a crafted request that sets their role to administrator, even if the form appears to limit options in the interface.

Once this request is processed, the attacker is created as a full admin on the site. After gaining administrative access, a threat actor can completely compromise the affected WordPress installation.

They can upload malicious plugins or themes with hidden backdoors, alter content to redirect visitors to phishing or malware sites, and plant spam or SEO poisoning payloads.

Given the plugin’s wide install base and the ease of exploitation when a vulnerable form is present, the impact is severe for any site that has exposed such a user action form to the public internet.

At the time of disclosure, the vendor released a fix in version 0.9.2.2, and security vendors have issued protections to block exploit attempts at the firewall level.

However, unpatched sites that rely only on application-level defenses remain attractive targets for opportunistic attackers scanning for misconfigured registration forms.

Vulnerability Details Table:-

Field Details
Vulnerability ID CVE-2025-14533
Plugin Name Advanced Custom Fields: Extended
Plugin Slug acf-extended
Affected Versions <= 0.9.2.1
Patched Version 0.9.2.2
Vulnerability Type Unauthenticated Privilege Escalation
Attack Vector Malicious user registration form submission
Required Conditions Public form with mapped role field present
CVSS Score 9.8 (Critical)
Installations Affected 100,000+ active installs
Discovery Credit andrea bocchetti via Wordfence Bug Bounty

How does the privilege escalation work?

The core of this vulnerability lies in the plugin’s flexible form system, which is designed to let site owners create custom user management workflows without writing code.

In a typical setup, an administrator defines a field group that includes fields for user information and links it to a “Create user” or “Update user” form action.

One of these fields can be a role selector, which, on the surface, appears to be limited by an “Allow User Role” setting.

Behind the scenes, when a form is submitted, the plugin calls the insert_user() function inside the acfe_module_form_action_user class.

This function collects all submitted values, including any mapped role field, and passes them directly into WordPress’ native wp_insert_user() function.

The problem is that, in the vulnerable versions, the plugin never enforces the role restriction that the site owner configured in the field group.

The form settings give a sense of safety, but the backend logic does not honor those limits.

As a result, if a public-facing form includes a mapped role field, an unauthenticated attacker can bypass the visible role choices and send their own value, such as administrator, in the HTTP request.

Since the plugin does not validate or filter this role before user creation, WordPress accepts the request and creates a new account with full admin rights. There is no need for an existing account, social engineering, or password guessing.

Once inside as an administrator, an attacker has the same control as a legitimate site owner.

They can install a malicious plugin, modify theme files to inject backdoors, change site settings, or create additional administrator accounts to maintain access even if the first account is discovered and removed.

This makes CVE-2025-14533 a direct path to complete site compromise whenever the vulnerable configuration exists.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitMalwarePatchphishingSecurityThreatVulnerability

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

New Study Shows GPT-5.2 Can Reliably Develop Zero-Day Exploits at

Next Post

NCSC Warns of Hacktivist Groups Attacking UK Organisations and

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Instagram Ending Encrypted Direct Messages Encryption
May 5, 2026
Beware Fake Notepad++ for Mac Site Can Harm Your Machine
May 5, 2026
Critical Android Zero-Click Flaw Grants Remote Shell Access
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us