CVE-2025-13486 - Advanced Custom Fields: Extended - Remote Code Execution π°
Description:
Advanced Custom Fields: Extended WordPress plugin 0.9.0.5 through 0.9.1.1 contains a remote code execution caused by unsafe use of call_user_func_array() in prepare_form() function, letting unauthenticated attackers execute arbitrary code remotely.
Severity: Critical
POC:
- https://github.com/lasthero-887/CVE-2025-13486---Poc
KEV: True
Shodan Query: NA
Acceptance Criteria: The template must include a complete POC and should not rely solely on version-based detection. Contributors are required to provide debug data(
-debug) along with the template to help the triage team with validation or can also share a vulnerable environment like docker file.
Rewards will only be given once the template is fully validated by the team. Templates that are incomplete or invalid will not be accepted. Avoid adding code templates for CVEs that can be achieved using HTTP, TCP, or JavaScript. Such templates are blocked by default and wonβt produce results, so we prioritize creating templates with other protocols unless exceptions are made.
You can check the FAQ for the Nuclei Templates Community Rewards Program here.
/bounty $100
π $100 bounty β’ ProjectDiscovery Bounty Available for CVE Template Contribution
Steps to Contribute:
- Claim attempt: Comment
/attempt #14212on this issue to claim attempt. Multiple participants can attempt, but only the first to submit a complete POC template along with full debug data will receive the reward similar to bug bounty programs. - Write the Template: Create a high-quality Nuclei template for the specified CVE, following our Contribution Guidelines and Acceptance Criteria.
- Submit the Template: Open a pull request (PR) to projectdiscovery/nuclei-templates and include /claim
#14212in the PR body to claim the bounty. - Receive Payment: Upon successful merge of your PR, you will receive 100% of the bounty through Algora.io within 2-5 days. Ensure you are eligible for payouts.
Thank you for contributing to projectdiscovery/nuclei-templates and helping us democratize security!
Acceptance Criteria: The template must include a complete POC and should not rely solely on version-based detection. Contributors must share vulnerable setup information or a testable instance by emailing [email protected]. Providing a testable instance significantly reduces validation time and increases the chance of quicker rewards. Templates that are incomplete, invalid, or non-verifiable will not be accepted. Avoid submitting code templates for CVEs that can be detected using HTTP, TCP, or JavaScript only these are blocked by default and will not produce results. Exceptions may apply for certain cases. Do not submit AI-simulated vulnerable environments. To qualify for the bounty, the team must be able to fully validate the POC. If you have hosted a vulnerable environment for validation, send the details (IP or Docker setup) along with the PR number to templates[at]projectdiscovery.io
You can check the FAQ for the Nuclei Templates Community Rewards Program here.
Add a bounty β’ Share on socials
| Attempt | Started (UTC) | Solution | Actions |
|---|---|---|---|
| π’ @Drshnnn | Dec 04, 2025, 04:47:36 AM | #14214 | Reward |
| π’ @brymut | Dec 04, 2025, 05:13:47 AM | WIP | |
| π’ @0xanis | Dec 04, 2025, 06:49:21 AM | #14215 | Reward |
| π’ @Lulzx | Dec 04, 2025, 10:41:52 AM | #14220 | Reward |
| π’ @KrE80r | Dec 04, 2025, 11:40:55 AM | #14234 | Reward |
/attempt #14212
/attempt 14212
/attempt #14212