Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14533: CWE-269 Improper Privilege Management in hwk-fr Advanced Custom Fields: Extended

0
Critical
VulnerabilityCVE-2025-14533cvecve-2025-14533cwe-269
Published: Tue Jan 20 2026 (01/20/2026, 09:25:00 UTC)
Source: CVE Database V5
Vendor/Project: hwk-fr
Product: Advanced Custom Fields: Extended

Description

The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 0.9.2.1. This is due to the 'insert_user' function not restricting the roles with which a user can register. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site. Note: The vulnerability can only be exploited if 'role' is mapped to the custom field.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:24:48 UTC

Technical Analysis

CVE-2025-14533 is a critical security vulnerability identified in the Advanced Custom Fields: Extended plugin for WordPress, affecting all versions up to and including 0.9.2.1. The vulnerability stems from improper privilege management (CWE-269) in the 'insert_user' function, which does not properly restrict the roles that can be assigned during user registration. Specifically, if the 'role' attribute is mapped to a custom field, an unauthenticated attacker can supply the 'administrator' role value during registration, thereby gaining full administrative privileges on the WordPress site. This bypasses normal authentication and authorization controls, allowing complete takeover of the site. The vulnerability has a CVSS 3.1 base score of 9.8, indicating critical severity with network attack vector, no required privileges or user interaction, and full impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the ease of exploitation and potential impact make this a highly urgent threat. The flaw is rooted in the plugin’s failure to validate or restrict role assignments during user creation, which is a fundamental security oversight. Since WordPress is widely used globally, and this plugin is popular among developers for extending custom fields, the vulnerability poses a significant risk to many websites. No official patches or updates are currently linked, so mitigation requires immediate attention to role mapping configurations or disabling the vulnerable plugin until a fix is available.

Potential Impact

The impact of CVE-2025-14533 is severe for organizations running WordPress sites with the Advanced Custom Fields: Extended plugin. Successful exploitation grants unauthenticated attackers full administrator privileges, enabling them to control the entire website. This includes the ability to modify content, install malicious code, steal sensitive data, disrupt services, and pivot to other parts of the hosting environment. The compromise of administrator accounts undermines the confidentiality, integrity, and availability of the affected systems. Given WordPress’s extensive use across industries, including e-commerce, media, government, and education, the vulnerability could lead to widespread data breaches, defacement, ransomware deployment, or persistent backdoors. The lack of required authentication and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation once the vulnerability becomes widely known. Organizations face reputational damage, regulatory penalties, and operational disruption if they do not address this vulnerability promptly.

Mitigation Recommendations

To mitigate CVE-2025-14533, organizations should immediately audit their WordPress installations for the presence of the Advanced Custom Fields: Extended plugin, particularly versions up to 0.9.2.1. If the plugin is in use, verify whether the 'role' attribute is mapped to any custom fields; if so, remove or restrict this mapping to prevent role assignment via user registration. Until an official patch is released, consider disabling or uninstalling the plugin to eliminate the attack vector. Implement strict input validation and role assignment controls within WordPress to ensure roles cannot be arbitrarily assigned during registration. Monitor logs for suspicious user creation activity, especially registrations with elevated roles. Employ web application firewalls (WAFs) with rules to detect and block attempts to exploit this vulnerability. Keep abreast of vendor updates and apply patches immediately once available. Additionally, enforce strong password policies and multi-factor authentication for all administrator accounts to reduce risk from compromised credentials.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-11T10:11:32.336Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696f4c7c4623b1157c28405e

Added to database: 1/20/2026, 9:35:56 AM

Last enriched: 2/27/2026, 11:24:48 AM

Last updated: 3/26/2026, 7:04:52 AM

Views: 228

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses