Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12030: CWE-639 Authorization Bypass Through User-Controlled Key in airesvsg ACF to REST API

0
Medium
VulnerabilityCVE-2025-12030cvecve-2025-12030cwe-639
Published: Wed Jan 07 2026 (01/07/2026, 08:21:52 UTC)
Source: CVE Database V5
Vendor/Project: airesvsg
Product: ACF to REST API

Description

The ACF to REST API plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.3.4. This is due to insufficient capability checks in the update_item_permissions_check() method, which only verifies that the current user has the edit_posts capability without checking object-specific permissions (e.g., edit_post($id), edit_user($id), manage_options). This makes it possible for authenticated attackers, with Contributor-level access and above, to modify ACF fields on posts they do not own, any user account, comments, taxonomy terms, and even the global options page via the /wp-json/acf/v3/{type}/{id} endpoints, granted they can authenticate to the site.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 19:54:05 UTC

Technical Analysis

CVE-2025-12030 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the ACF to REST API plugin for WordPress, specifically all versions up to and including 3.3.4. The vulnerability stems from the update_item_permissions_check() method, which performs insufficient capability checks by only verifying if the current user has the generic edit_posts capability. It fails to enforce object-specific permission checks such as edit_post($id), edit_user($id), or manage_options. Consequently, authenticated users with Contributor-level access or higher can exploit this flaw to modify Advanced Custom Fields (ACF) data on posts they do not own, user accounts, comments, taxonomy terms, and even the global options page through the REST API endpoints structured as /wp-json/acf/v3/{type}/{id}. The attack requires authentication but no additional user interaction. The vulnerability impacts the integrity of site data by allowing unauthorized modifications but does not affect confidentiality or availability. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the low complexity of exploitation (low attack complexity), network attack vector, and limited privileges required (low privileges). No known public exploits or patches have been reported as of the publication date. The flaw is significant because it expands the attack surface for authenticated users with limited privileges, potentially enabling privilege escalation or unauthorized data manipulation within WordPress sites using this plugin.

Potential Impact

The primary impact of CVE-2025-12030 is the unauthorized modification of site content and configuration data, which can undermine the integrity of WordPress sites using the ACF to REST API plugin. Attackers with Contributor-level access or higher can alter posts they do not own, user account data, comments, taxonomy terms, and global options, potentially leading to defacement, misinformation, or configuration changes that could facilitate further attacks. Although confidentiality and availability are not directly affected, the integrity compromise can erode trust in the affected websites and disrupt normal operations. For organizations relying on WordPress for content management, especially those with multiple contributors or less restrictive user role assignments, this vulnerability could enable insider threats or external attackers who have compromised low-privilege accounts to escalate their influence. The lack of object-specific permission checks increases the risk of privilege escalation and unauthorized data manipulation, which could be leveraged for social engineering, phishing, or further exploitation. The vulnerability's network accessibility via REST API endpoints increases the attack surface, making it easier to exploit remotely once authentication is obtained.

Mitigation Recommendations

To mitigate CVE-2025-12030, organizations should immediately audit and restrict user roles and capabilities within WordPress, ensuring that only trusted users have Contributor-level or higher access. Implement the principle of least privilege by limiting the number of users who can authenticate with elevated permissions. Monitor and log REST API usage, particularly calls to /wp-json/acf/v3/{type}/{id} endpoints, to detect suspicious modification attempts. Disable or restrict the ACF to REST API plugin if it is not essential for site functionality. Until an official patch is released, consider implementing custom capability checks or filters in WordPress to enforce object-specific permissions on REST API requests related to ACF fields. Employ Web Application Firewalls (WAFs) with rules targeting anomalous REST API activity. Regularly update all WordPress plugins and core software to incorporate security fixes promptly. Finally, educate site administrators and developers about the risks of insufficient authorization checks in plugins and the importance of secure coding practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-21T15:58:35.995Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e1b2fa55ed4ed998cb62b

Added to database: 1/7/2026, 8:37:03 AM

Last enriched: 2/27/2026, 7:54:05 PM

Last updated: 3/25/2026, 2:30:08 AM

Views: 121

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses