Description
The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 0.9.2.1. This is due to the 'insert_user' function not restricting the roles with which a user can register. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site. Note: The vulnerability can only be exploited if 'role' is mapped to the custom field.
Published: 2026-01-20
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated privilege escalation to administrator
Action: Patch Now
AI Analysis

Impact

The Advanced Custom Fields: Extended plugin for WordPress contains a flaw that allows any user, even without authentication, to create a new user account with the administrator role. The flaw exists because the insert_user function does not enforce role restrictions when the value for the role field is supplied. If an attacker supplies the word "administrator" in the role field during a form submission, the plugin will create an account with full administrator privileges, providing complete control over the site.

Affected Systems

All installations of the Advanced Custom Fields: Extended plugin up to and including version 0.9.2.1 are vulnerable. The vulnerability relies on the role field being mapped to a custom field in the form module. Sites that use this mapping and the affected plugin version are impacted; newer releases such as 0.9.2.2 and later are not affected.

Risk and Exploitability

With a CVSS score of 9.8, the vulnerability is considered critical. The EPSS score of less than 1% indicates a low probability of exploitation in the wild, and the issue is not listed in CISA's KEV catalog. The attack vector is web‑based: an unauthenticated user can submit the form that creates a new user. The flaw only works if the role mapping is enabled, which is common in default configurations. Once exploited, the attacker gains system‑wide administrative access, allowing modification of site content, plugins, users, and configuration.

Generated by OpenCVE AI on April 20, 2026 at 21:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Advanced Custom Fields: Extended to version 0.9.2.2 or later
  • If upgrading immediately is not possible, remove or disable the custom field that maps to the role so that users cannot set it during registration
  • Restrict access to the user‑creation form or lock the site down temporarily until the plugin is updated

Generated by OpenCVE AI on April 20, 2026 at 21:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 21 Jan 2026 11:30:00 +0000

Type Values Removed Values Added
First Time appeared Hwk-fr
Hwk-fr advanced Custom Fields
Wordpress
Wordpress wordpress
Vendors & Products Hwk-fr
Hwk-fr advanced Custom Fields
Wordpress
Wordpress wordpress

Tue, 20 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
Description The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 0.9.2.1. This is due to the 'insert_user' function not restricting the roles with which a user can register. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site. Note: The vulnerability can only be exploited if 'role' is mapped to the custom field.
Title Advanced Custom Fields: Extended <= 0.9.2.1 - Unauthenticated Privilege Escalation via Insert User Form Action
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Hwk-fr Advanced Custom Fields
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:25:47.419Z

Reserved: 2025-12-11T10:11:32.336Z

Link: CVE-2025-14533

cve-icon Vulnrichment

Updated: 2026-01-20T15:09:17.443Z

cve-icon NVD

Status : Deferred

Published: 2026-01-20T10:16:05.583

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14533

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T21:15:20Z

Weaknesses