// For flags

CVE-2024-49593

Advanced Custom Fields <= 6.3.8 & Secure Custom Fields <= 6.3.6.2 - Authenticated (Admin+) Stored Cross-Site Scripting

Severity Score

4.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

In Advanced Custom Fields (ACF) before 6.3.9 and Secure Custom Fields before 6.3.6.3 (plugins for WordPress), using the Field Group editor to edit one of the plugin's fields can result in execution of a stored XSS payload. NOTE: if you wish to use the WP Engine alternative update mechanism for the free version of ACF, then you can follow the process shown at the advancedcustomfields.com blog URL within the References section below.

En Advanced Custom Fields (ACF) anterior a la versión 6.3.9 y Secure Custom Fields anterior a la versión 6.3.6.3 (complementos para WordPress), el uso del editor de grupos de campos para editar uno de los campos del complemento puede provocar la ejecución de un payload XSS almacenado. NOTA: si desea utilizar el mecanismo de actualización alternativo de WP Engine para la versión gratuita de ACF, puede seguir el proceso que se muestra en la URL del blog advancedcustomfields.com dentro de la sección Referencias a continuación.

The Advanced Custom Fields & Secure Custom Fields plugins for WordPress are vulnerable to Stored Cross-Site Scripting via ACF field labels in all versions up to, and including, 6.3.8 & 6.3.6.2 respectively due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. Please follow the reference listed in this vulnerability record for instructions on how to update to the latest version of ACF that patches this issue and ensures accessibility to updates moving forward. Special note: only the minified files in Secure Custom Fields have been patched meaning the source build files are still vulnerable.

*Credits: Duc Luong Tran
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-10-15 CVE Published
  • 2024-10-17 CVE Reserved
  • 2024-10-17 EPSS Updated
  • 2024-10-21 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Advanced Custom Fields
Search vendor "Advanced Custom Fields"
Advanced Custom Fields
Search vendor "Advanced Custom Fields" for product "Advanced Custom Fields"
>= 0.0.0.0 <= 6.3.6.2
Search vendor "Advanced Custom Fields" for product "Advanced Custom Fields" and version " >= 0.0.0.0 <= 6.3.6.2"
en
Affected