We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
The WordPress plugin Advanced Custom Fields (ACF) version 3.5.1 and below contains a remote file inclusion (RFI) vulnerability in core/actions/export.php. When the PHP configuration directive allow_url_include is enabled (default: Off), an unauthenticated attacker can exploit the acf_abspath POST parameter to include and execute arbitrary remote PHP code. This leads to remote code execution under the web server’s context, allowing full compromise of the host.
Reserved 2025-08-05 | Published 2025-08-05 | Updated 2025-08-05 | Assigner VulnCheckCharlie Eriksen
raw.githubusercontent.com/..._advanced_custom_fields_exec.rb
www.exploit-db.com/exploits/23856
web.archive.org/...26/http://secunia.com:80/advisories/51037
www.tenable.com/plugins/nessus/63326
www.wordfence.com/...ode-execution-via-remote-file-inclusion
wpscan.com/...rability/d132d93b-509c-490d-8001-87147ed28c5e/
wordpress.org/plugins/advanced-custom-fields/
www.vulncheck.com/...ced-custom-fields-remote-file-inclusion
Support options