Insecure Direct Object Reference in ACF to REST API Plugin for WordPress
CVE-2025-12030
Key Information:
- Vendor
WordPress
- Status
- Vendor
- CVE Published:
- 7 January 2026
Badges
What is CVE-2025-12030?
The ACF to REST API plugin for WordPress is susceptible to Insecure Direct Object Reference, enabling attackers with Contributor-level access and above to manipulate ACF fields for posts they do not own. This security issue stems from inadequate capability checks within the update_item_permissions_check() method, where the current user’s permissions are validated only at a generic level, without validating specific object permissions. Consequently, authenticated users can exploit this flaw to alter user accounts, comments, taxonomy terms, and even global settings via accessible API endpoints, posing a significant risk to WordPress site integrity.
Affected Version(s)
ACF to REST API * <= 3.3.4
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved