CVE-2012-10025
WordPress Plugin Advanced Custom Fields <= 3.5.1 Remote File Inclusion
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
The WordPress plugin Advanced Custom Fields (ACF) version 3.5.1 and below contains a remote file inclusion (RFI) vulnerability in core/actions/export.php. When the PHP configuration directive allow_url_include is enabled (default: Off), an unauthenticated attacker can exploit the acf_abspath POST parameter to include and execute arbitrary remote PHP code. This leads to remote code execution under the web serverβs context, allowing full compromise of the host.
| CWE | CWE-98 |
| Vendor | advanced custom fields |
| Product | wordpress plugin |
| Published | Aug 5, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for advanced custom fields wordpress plugin
Be the first to know when new unknown vulnerabilities affecting advanced custom fields wordpress plugin are published β delivered to Slack, Telegram or Discord.
Get Free Alerts β
Free Β· No credit card Β· 60 sec setup
Affected Versions
Advanced Custom Fields / WordPress Plugin
* β€ 3.5.1
References
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/wp_advanced_custom_fields_exec.rb exploit-db.com: https://www.exploit-db.com/exploits/23856 web.archive.org: http://web.archive.org/web/20121223025326/http://secunia.com:80/advisories/51037 tenable.com: https://www.tenable.com/plugins/nessus/63326 wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/advanced-custom-fields/advanced-custom-fields-351-remote-code-execution-via-remote-file-inclusion wpscan.com: https://wpscan.com/vulnerability/d132d93b-509c-490d-8001-87147ed28c5e/ wordpress.org: https://wordpress.org/plugins/advanced-custom-fields/ vulncheck.com: https://www.vulncheck.com/advisories/wordpress-plugin-advanced-custom-fields-remote-file-inclusion
Credits
Charlie Eriksen