WP Advanced Custom Fields Extended plugin bug gives admin

Your friendly reminder to minimize the WordPress plugins you deploy to what you actually need. BleepingComputer has an article:

A critical-severity vulnerability in the Advanced Custom Fields: Extended (ACF Extended) plugin for WordPress can be exploited remotely by unauthenticated attackers to obtain administrative permissions.

ACF Extended, currently active on 100,000 websites, is a specialized plugin that extends the capabilities of the Advanced Custom Fields (ACF) plugin with features for developers and advanced site builders.

Unauthenticated privilege escalation to get admin is about as bad as it gets. Though, it does appear the WordPress blog has to have mapped “role” as a custom field. It’s impossible for anyone other than the blog owner to know if that’s the case. Well, probably spammers and scammers seeking sites to compromise and turn into platforms to exploit might given which ones they successfully turn.

It’s tracked as CVE-2025-14533:

#tenable #vulnerability #Wordpress #wordpressPlugins
ACF plugin bug gives hackers admin on 50,000 WordPress sites

A critical-severity vulnerability in the Advanced Custom Fields: Extended (ACF Extended) plugin for WordPress can be exploited remotely by unauthenticated attackers to obtain administrative permissions.

BleepingComputer
Swear to god, if I ever physically encounter someone that works for #Tenable, especially their #Nessus group, and especially the team that's in charge of the nessus-agent for #Linux, I will hose them down with Napalm and set them on fire.

#security
Microsoft Patch Tuesday, December 2025 Edition – Krebs on Security

Heyyyyy #Tenable #Nessus? Can we maybe not run sketchy-looking #PowerShell on my computer? I just happened to catch this in the logs. Kay, thanks.
Private data at risk due to seven ChatGPT vulnerabilities | Tenable®

Tenable research has identified seven vulnerabilities in ChatGPT that could enable an attacker to exfiltrate private information from users' memories and chat histories.

Tenable®

NVD Delays Leave Defenders in the Dark — Early Visibility is Key
Tenable’s recent analysis shows a worrying pattern in vulnerability disclosure timing:
- 63,862 CVEs from 2024–2025
- 56% of PoCs released within 7 days
- NVD lagging by ~15 days
- Exploitation confirmed in as little as 5 days
This gap between CVE assignment, PoC publication, and NVD visibility creates exploitable blind spots for enterprises relying on traditional patch cycles.
💬 Security leaders - how do you bridge these gaps? Do you trust vendor advisories, exploit feeds, or telemetry-driven signals more?

👍 Like and follow @technadu for continuous coverage of emerging vulnerability management insights.

#InfoSec #CyberSecurity #VulnerabilityManagement #ThreatIntel #NVD #Exploit #RiskIntel #Tenable #CVEs #CyberDefense #ZeroDay #CVETracking #VulnDisclosure #TechNadu

Patch Tuesday, October 2025 ‘End of 10’ Edition - Microsoft today released software updates to plug a whopping 172 security holes in its Wi... https://krebsonsecurity.com/2025/10/patch-tuesday-october-2025-end-of-10-edition/ #microsoftpatchtuesdayoctober2025 #microsoftoffice #cve-2025-24990 #cve-2025-59227 #cve-2025-59230 #cve-2025-59234 #cve-2025-59287 #satnamnarang #timetopatch #immersive #kevbreen #tenable
Patch Tuesday, October 2025 ‘End of 10’ Edition – Krebs on Security

🧠 EDR Tools Are Not Exposure Management Solutions.

They’re reactive, not proactive - designed to respond after compromise, not prevent it.
EDR misses entire classes of assets like routers, IoT, and third-party systems.

💬 What’s your approach to achieving full attack surface visibility?

Follow @technadu for more discussions on vulnerability intelligence and exposure reduction.

#CyberSecurity #ExposureManagement #EDR #Tenable #InfoSec #ThreatDetection #VulnerabilityIntelligence #TechNadu