Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12030: CWE-639 Authorization Bypass Through User-Controlled Key in airesvsg ACF to REST API

0
Medium
VulnerabilityCVE-2025-12030cvecve-2025-12030cwe-639
Published: Wed Jan 07 2026 (01/07/2026, 08:21:52 UTC)
Source: CVE Database V5
Vendor/Project: airesvsg
Product: ACF to REST API

Description

The ACF to REST API plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.3.4. This is due to insufficient capability checks in the update_item_permissions_check() method, which only verifies that the current user has the edit_posts capability without checking object-specific permissions (e.g., edit_post($id), edit_user($id), manage_options). This makes it possible for authenticated attackers, with Contributor-level access and above, to modify ACF fields on posts they do not own, any user account, comments, taxonomy terms, and even the global options page via the /wp-json/acf/v3/{type}/{id} endpoints, granted they can authenticate to the site.

AI-Powered Analysis

AILast updated: 01/07/2026, 08:55:13 UTC

Technical Analysis

CVE-2025-12030 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the ACF to REST API plugin for WordPress. The flaw exists because the update_item_permissions_check() method inadequately verifies user capabilities; it only checks for the generic edit_posts capability rather than object-specific permissions such as edit_post($id), edit_user($id), or manage_options. This insufficient validation allows authenticated users with Contributor-level access or higher to modify Advanced Custom Fields on posts they do not own, as well as alter user accounts, comments, taxonomy terms, and global options through the REST API endpoints structured as /wp-json/acf/v3/{type}/{id}. Since the vulnerability requires authentication but no further user interaction, it can be exploited by any user with minimal privileges beyond Contributor. The impact is primarily on data integrity, as unauthorized modifications can be made to content and configuration settings. The vulnerability affects all versions up to and including 3.3.4 of the plugin. Although no public exploits are reported, the ease of exploitation and the widespread use of WordPress and this plugin make it a significant concern. The CVSS score is 4.3 (medium), reflecting the low complexity of attack but limited impact on confidentiality and availability.

Potential Impact

For European organizations, this vulnerability poses a risk to the integrity of website content and configuration. Attackers with Contributor-level access can deface posts, manipulate user data, alter comments, and change global options, potentially undermining trust and operational stability. Organizations relying on WordPress sites for public-facing content, e-commerce, or internal portals could face reputational damage, data corruption, or unauthorized privilege escalation if attackers leverage this flaw to escalate their access or disrupt services. The impact is heightened in sectors where content integrity is critical, such as media, government, and financial services. Since the vulnerability requires authentication, the risk is greater in environments with many users having Contributor or higher privileges, or where credential compromise is possible. The lack of known exploits reduces immediate threat but does not eliminate the risk of future attacks.

Mitigation Recommendations

1. Monitor for and apply official patches or updates from the plugin vendor as soon as they become available. 2. Until patched, restrict the number of users with Contributor-level or higher access, enforcing the principle of least privilege. 3. Implement additional access control mechanisms on REST API endpoints, such as custom permission checks or endpoint restrictions via security plugins or web application firewalls. 4. Regularly audit user roles and capabilities to ensure no excessive permissions are granted. 5. Employ monitoring and alerting on unexpected changes to ACF fields, user accounts, comments, and global options to detect potential exploitation. 6. Consider disabling or limiting the use of the ACF to REST API plugin if it is not essential. 7. Harden authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. 8. Review and restrict REST API access to trusted users and IP ranges where feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-21T15:58:35.995Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e1b2fa55ed4ed998cb62b

Added to database: 1/7/2026, 8:37:03 AM

Last enriched: 1/7/2026, 8:55:13 AM

Last updated: 1/8/2026, 4:27:59 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats