nuclei-templates icon indicating copy to clipboard operation
nuclei-templates copied to clipboard

CVE-2025-13486 - Advanced Custom Fields: Extended - Remote Code Execution πŸ’°

Open princechaddha opened this issue 4 months ago β€’ 6 comments

Description:

Advanced Custom Fields: Extended WordPress plugin 0.9.0.5 through 0.9.1.1 contains a remote code execution caused by unsafe use of call_user_func_array() in prepare_form() function, letting unauthenticated attackers execute arbitrary code remotely.

Severity: Critical

POC:

  • https://github.com/lasthero-887/CVE-2025-13486---Poc

KEV: True

Shodan Query: NA

Acceptance Criteria: The template must include a complete POC and should not rely solely on version-based detection. Contributors are required to provide debug data(-debug) along with the template to help the triage team with validation or can also share a vulnerable environment like docker file.

Rewards will only be given once the template is fully validated by the team. Templates that are incomplete or invalid will not be accepted. Avoid adding code templates for CVEs that can be achieved using HTTP, TCP, or JavaScript. Such templates are blocked by default and won’t produce results, so we prioritize creating templates with other protocols unless exceptions are made.

You can check the FAQ for the Nuclei Templates Community Rewards Program here.

princechaddha avatar Dec 04 '25 02:12 princechaddha

/bounty $100

princechaddha avatar Dec 04 '25 02:12 princechaddha

πŸ’Ž $100 bounty β€’ ProjectDiscovery Bounty Available for CVE Template Contribution

Steps to Contribute:

  • Claim attempt: Comment /attempt #14212 on this issue to claim attempt. Multiple participants can attempt, but only the first to submit a complete POC template along with full debug data will receive the reward similar to bug bounty programs.
  • Write the Template: Create a high-quality Nuclei template for the specified CVE, following our Contribution Guidelines and Acceptance Criteria.
  • Submit the Template: Open a pull request (PR) to projectdiscovery/nuclei-templates and include /claim #14212 in the PR body to claim the bounty.
  • Receive Payment: Upon successful merge of your PR, you will receive 100% of the bounty through Algora.io within 2-5 days. Ensure you are eligible for payouts.

Thank you for contributing to projectdiscovery/nuclei-templates and helping us democratize security!

Acceptance Criteria: The template must include a complete POC and should not rely solely on version-based detection. Contributors must share vulnerable setup information or a testable instance by emailing [email protected]. Providing a testable instance significantly reduces validation time and increases the chance of quicker rewards. Templates that are incomplete, invalid, or non-verifiable will not be accepted. Avoid submitting code templates for CVEs that can be detected using HTTP, TCP, or JavaScript only these are blocked by default and will not produce results. Exceptions may apply for certain cases. Do not submit AI-simulated vulnerable environments. To qualify for the bounty, the team must be able to fully validate the POC. If you have hosted a vulnerable environment for validation, send the details (IP or Docker setup) along with the PR number to templates[at]projectdiscovery.io

You can check the FAQ for the Nuclei Templates Community Rewards Program here.

Add a bounty β€’ Share on socials

Attempt Started (UTC) Solution Actions
🟒 @Drshnnn Dec 04, 2025, 04:47:36 AM #14214 Reward
🟒 @brymut Dec 04, 2025, 05:13:47 AM WIP
🟒 @0xanis Dec 04, 2025, 06:49:21 AM #14215 Reward
🟒 @Lulzx Dec 04, 2025, 10:41:52 AM #14220 Reward
🟒 @KrE80r Dec 04, 2025, 11:40:55 AM #14234 Reward

algora-pbc[bot] avatar Dec 04 '25 02:12 algora-pbc[bot]

/attempt #14212

Drshnnn avatar Dec 04 '25 04:12 Drshnnn

/attempt 14212

0xanis avatar Dec 04 '25 06:12 0xanis

/attempt #14212

KrE80r avatar Dec 04 '25 11:12 KrE80r