CVE-2024-37250

5.4 MEDIUM

📋 TL;DR

This vulnerability allows attackers with subscriber-level access to perform unauthorized actions in Advanced Custom Fields PRO for WordPress. It affects all WordPress sites using Advanced Custom Fields PRO versions up to 6.3.1. The missing authorization check enables privilege escalation through broken access control.

💻 Affected Systems

Products:
  • Advanced Custom Fields PRO
Versions: All versions up to and including 6.3.1
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Advanced Custom Fields PRO plugin installed. Vulnerability exists in default configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with subscriber accounts could modify custom fields, potentially altering site content, configurations, or injecting malicious code that affects all users.

🟠

Likely Case

Subscribers gaining unauthorized access to edit custom fields they shouldn't have permission to modify, potentially disrupting site functionality or content.

🟢

If Mitigated

With proper role-based access controls and network segmentation, impact would be limited to minor content modifications within the subscriber's scope.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires subscriber-level access. Exploitation is straightforward once an attacker has valid subscriber credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.3.2

Vendor Advisory: https://patchstack.com/database/vulnerability/advanced-custom-fields-pro/wordpress-advanced-custom-fields-pro-6-3-2-subscriber-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Advanced Custom Fields PRO. 4. Click 'Update Now' if available. 5. Alternatively, download version 6.3.2+ from WPEngine and manually update.

🔧 Temporary Workarounds

Temporary Role Restriction

all

Temporarily restrict subscriber role capabilities until patch can be applied

wp role reset subscriber --yes

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate WordPress admin interfaces
  • Enable detailed logging and monitoring for custom field modifications by subscriber roles

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Advanced Custom Fields PRO → Version. If version is 6.3.1 or lower, system is vulnerable.

Check Version:

wp plugin get advanced-custom-fields-pro --field=version

Verify Fix Applied:

Verify Advanced Custom Fields PRO version is 6.3.2 or higher in WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized custom field modifications by subscriber roles
  • Multiple failed authorization attempts followed by successful custom field edits

Network Indicators:

  • Unusual POST requests to wp-admin/admin-ajax.php from subscriber accounts
  • Suspicious custom field update patterns

SIEM Query:

source="wordpress.log" AND ("custom_field" OR "acf") AND user_role="subscriber" AND action="edit"

🔗 References

📤 Share & Export