Skip to content

Commit 2bb30ba

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 6c4a61f commit 2bb30ba

File tree

1 file changed

+61
-0
lines changed

1 file changed

+61
-0
lines changed

db/modules_metadata_base.json

Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -121507,6 +121507,67 @@
121507121507
"session_types": false,
121508121508
"needs_cleanup": true
121509121509
},
121510+
"exploit_multi/http/wp_acf_extended_rce": {
121511+
"name": "WordPress ACF Extended Unauthenticated RCE via prepare_form()",
121512+
"fullname": "exploit/multi/http/wp_acf_extended_rce",
121513+
"aliases": [],
121514+
"rank": 600,
121515+
"disclosure_date": "2025-12-02",
121516+
"type": "exploit",
121517+
"author": [
121518+
"Marcin Dudek (dudekmar) - CERT.PL",
121519+
"Valentin Lobstein <[email protected]>"
121520+
],
121521+
"description": "This module exploits an unauthenticated Remote Code Execution vulnerability in the\n Advanced Custom Fields: Extended (ACF Extended) WordPress plugin versions 0.9.0.5\n through 0.9.1.1. The vulnerability exists in the prepare_form() function of the\n acfe_module_form_front_render class, which accepts user-controlled input via the\n form[render] parameter and passes it directly to call_user_func_array() without\n proper sanitization.\n\n This exploit requires a WordPress page containing an ACF Extended form widget, which\n exposes the required nonce token in the page's JavaScript. The NONCE_PAGE option\n must be set to the path of such a page.\n\n Once an administrator account is created via wp_insert_user(), the module uploads\n and executes a malicious plugin to achieve remote code execution (RCE).",
121522+
"references": [
121523+
"CVE-2025-13486",
121524+
"URL-https://www.wordfence.com/blog/2025/12/100000-wordpress-sites-affected-by-remote-code-execution-vulnerability-in-advanced-custom-fields-extended-wordpress-plugin/"
121525+
],
121526+
"platform": "Linux,PHP,Unix,Windows",
121527+
"arch": "php, cmd",
121528+
"rport": 80,
121529+
"autofilter_ports": [
121530+
80,
121531+
8080,
121532+
443,
121533+
8000,
121534+
8888,
121535+
8880,
121536+
8008,
121537+
3000,
121538+
8443
121539+
],
121540+
"autofilter_services": [
121541+
"http",
121542+
"https"
121543+
],
121544+
"targets": [
121545+
"PHP In-Memory",
121546+
"Unix/Linux Command Shell",
121547+
"Windows Command Shell"
121548+
],
121549+
"mod_time": "2025-12-09 21:07:01 +0000",
121550+
"path": "/modules/exploits/multi/http/wp_acf_extended_rce.rb",
121551+
"is_install_path": true,
121552+
"ref_name": "multi/http/wp_acf_extended_rce",
121553+
"check": true,
121554+
"post_auth": true,
121555+
"default_credential": false,
121556+
"notes": {
121557+
"Stability": [
121558+
"crash-safe"
121559+
],
121560+
"Reliability": [
121561+
"repeatable-session"
121562+
],
121563+
"SideEffects": [
121564+
"ioc-in-logs",
121565+
"artifacts-on-disk"
121566+
]
121567+
},
121568+
"session_types": false,
121569+
"needs_cleanup": true
121570+
},
121510121571
"exploit_multi/http/wp_ai_engine_mcp_rce": {
121511121572
"name": "WordPress AI Engine Plugin MCP Unauthenticated Admin Creation to RCE",
121512121573
"fullname": "exploit/multi/http/wp_ai_engine_mcp_rce",

0 commit comments

Comments
 (0)