CVE-2025-62979

5.3 MEDIUM

📋 TL;DR

This vulnerability in the ACF to REST API WordPress plugin exposes sensitive data embedded in Advanced Custom Fields through the REST API. Attackers can retrieve information that should remain private by making unauthenticated requests to affected endpoints. WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • ACF to REST API WordPress Plugin
Versions: All versions through 3.3.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects WordPress installations with the ACF to REST API plugin enabled and using Advanced Custom Fields with sensitive data.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers retrieve sensitive user data, API keys, credentials, or other confidential information stored in custom fields, leading to data breaches and potential account compromise.

🟠

Likely Case

Unauthenticated users access private field data like internal notes, configuration details, or user metadata that should not be publicly exposed.

🟢

If Mitigated

With proper access controls and field filtering, only authorized users can access sensitive data, limiting exposure to authenticated administrators.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of WordPress REST API endpoints and ACF field structure. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.3.5 or later

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/acf-to-rest-api/vulnerability/wordpress-acf-to-rest-api-plugin-3-3-4-sensitive-data-exposure-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'ACF to REST API' and check if update is available. 4. Click 'Update Now' to install version 3.3.5 or later. 5. Verify the plugin is active and functioning correctly.

🔧 Temporary Workarounds

Disable REST API endpoints for sensitive fields

all

Modify ACF field settings to exclude sensitive fields from REST API exposure

Edit ACF field groups and set 'Show in REST API' to false for sensitive fields

Implement custom REST API authentication

all

Add authentication requirements to REST API endpoints containing sensitive data

Add WordPress authentication checks to REST API callback functions

🧯 If You Can't Patch

  • Disable the ACF to REST API plugin entirely if not critically needed
  • Implement web application firewall rules to block unauthorized REST API requests to sensitive endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for ACF to REST API version. If version is 3.3.4 or earlier, the site is vulnerable.

Check Version:

wp plugin list --name='ACF to REST API' --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 3.3.5 or later in WordPress admin. Test REST API endpoints that previously exposed sensitive data to confirm they now return appropriate access controls.

📡 Detection & Monitoring

Log Indicators:

  • Unusual volume of GET requests to /wp-json/acf/ endpoints
  • Requests to REST API endpoints from unauthorized IP addresses
  • Access attempts to sensitive field names in URL parameters

Network Indicators:

  • HTTP 200 responses containing sensitive field data in REST API responses
  • Pattern of requests probing for ACF field endpoints

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-json/acf/*" OR user_agent="*rest*api*") AND response_code=200

🔗 References

📤 Share & Export