Description
The Table Field Add-on for ACF and SCF plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Table Cell Content in all versions up to, and including, 1.3.30 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-01-06
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting available to authenticated users with Author level or higher
Action: Patch
AI Analysis

Impact

The Table Field Add‑on for ACF and SCF contains a stored cross‑site scripting flaw caused by inadequate input sanitization and output escaping of table cell content. Because the vulnerability only requires author‑level access, an attacker who can create or edit content can embed JavaScript that will run in the browsers of any user who views a page containing the injected table data. The flaw is a classic input‑validation weakness (CWE‑79) that could allow malicious code to be executed, compromising the confidentiality, integrity, or availability of affected sites for all visitors who load the affected content.

Affected Systems

The problem exists in all releases of the Table Field Add‑on for ACF and SCF up to and including version 1.3.30. The plugin is distributed by jonua under the name Table Field Add‑on for ACF and SCF. No specific build or platform constraints are noted beyond being a WordPress plugin; any WordPress installation that has the plugin installed and has users with author or higher role is at risk.

Risk and Exploitability

The CVSS score of 6.4 indicates moderate severity and the EPSS score of less than 1 % suggests a low current exploitation probability, yet the fact that authenticated users may inject arbitrary scripts means that once an attacker gains author access they can readily affect all site visitors. The flaw is not listed in CISA’s KEV catalog, but its potential for widespread impact remains if the vulnerable plugin remains installed. The likely attack vector is through the WordPress administration interface, where an attacker creates or modifies a table field and inserts malicious code into a cell. If a site administrator does not limit author capabilities or enable additional sanitization, the vulnerability can be exploited with relative ease.

Generated by OpenCVE AI on April 22, 2026 at 11:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Table Field Add‑on to a version newer than 1.3.30 as soon as an official patch is available
  • If an upgrade is not immediately possible, remove or disable the table field functionality or delete any existing tables that contain untrusted content
  • Restrict or review the capabilities of roles that have Author or higher access, ensuring only trusted users can create or edit content that may be rendered in the front‑end

Generated by OpenCVE AI on April 22, 2026 at 11:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 06 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 06 Jan 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 06 Jan 2026 07:30:00 +0000

Type Values Removed Values Added
Description The Table Field Add-on for ACF and SCF plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Table Cell Content in all versions up to, and including, 1.3.30 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Table Field Add-on for ACF and SCF <= 1.3.30 - Authenticated (Contributor+) Stored Cross-Site Scripting via Table Cell Content
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:09:47.978Z

Reserved: 2025-10-22T13:23:02.756Z

Link: CVE-2025-12067

cve-icon Vulnrichment

Updated: 2026-01-06T14:33:34.613Z

cve-icon NVD

Status : Deferred

Published: 2026-01-06T08:15:51.490

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12067

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T12:00:05Z

Weaknesses