{"id":151,"date":"2026-01-19T00:00:00","date_gmt":"2026-01-18T23:00:00","guid":{"rendered":"https:\/\/helloblog.io\/da\/kritisk-privilege-escalation-i-acf-extended-cve-2025-14533\/"},"modified":"2026-01-19T00:00:00","modified_gmt":"2026-01-18T23:00:00","slug":"kritisk-privilege-escalation-i-acf-extended-cve-2025-14533","status":"publish","type":"post","link":"https:\/\/helloblog.io\/da\/kritisk-privilege-escalation-i-acf-extended-cve-2025-14533\/","title":{"rendered":"Kritisk privilege escalation i ACF Extended: s\u00e5dan rammer CVE-2025-14533 din WordPress-l\u00f8sning"},"content":{"rendered":"\n<p>Hvis du bruger <strong>Advanced Custom Fields: Extended<\/strong> (ACF Extended) som addon til Advanced Custom Fields, s\u00e5 er der en vigtig sikkerhedsnyhed: En kritisk <strong>privilege escalation<\/strong> (rettighedseskalering) g\u00f8r det muligt for en <em>uautentificeret<\/em> angriber at ende med <strong>administrator-adgang<\/strong> \u2013 men kun hvis dit site er sat op p\u00e5 en bestemt m\u00e5de med ACF Extendeds formular-actions.<\/p>\n\n\n\n<p>S\u00e5rbarheden er registreret som <strong>CVE-2025-14533<\/strong> og p\u00e5virker ACF Extended i versioner <strong><= 0.9.2.1<\/strong>. Den er patchet i <strong>0.9.2.2<\/strong>. If\u00f8lge Wordfence har pluginet over <strong>100.000 aktive installationer<\/strong>, s\u00e5 det er en af de fejl, der hurtigt bliver relevant i praksis \u2013 is\u00e6r for bureau-sites med custom forms.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Hvad er problemet helt konkret?<\/h2>\n\n\n\n<p>ACF Extended har et form-modul, hvor du kan bygge formularer og koble dem til en action som fx <strong>\u201cCreate user\u201d<\/strong> (opret bruger) eller <strong>\u201cUpdate user\u201d<\/strong> (opdater bruger). I den s\u00e5rbare version kan en angriber udnytte, at pluginets user-insert flow ikke begr\u00e6nser, <strong>hvilken rolle<\/strong> der kan blive sat under registrering, hvis role-feltet er mappet ind i formularen.<\/p>\n\n\n\n<p>Det centrale er: Hvis din formular tillader, at en v\u00e6rdi for <code>role<\/code> bliver sendt med (og den er mappet til et custom field), kan angriberen supply <code>administrator<\/code> og f\u00e5 oprettet en admin-bruger.<\/p>\n\n\n\n<div class=\"wp-block-group callout callout-warning is-style-warning is-layout-flow wp-block-group-is-layout-flow\" style=\"border-width:1px;border-radius:8px;padding-top:1rem;padding-right:1.5rem;padding-bottom:1rem;padding-left:1.5rem\">\n\n<h4 class=\"wp-block-heading callout-title\">Vigtigt scope<\/h4>\n\n\n<p>Det er ikke alle sites med ACF Extended, der er reelt eksponerede. Udnyttelsen kr\u00e6ver, at du har en ACF Extended-form med \u201cCreate user\u201d\/\u201cUpdate user\u201d og at <code>role<\/code> er mappet som felt i den formular. Wordfence vurderer, at den ops\u00e6tning sandsynligvis er relativt sj\u00e6lden.<\/p>\n\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Hvorfor er det kritisk? (Hvad kan en angriber g\u00f8re som admin)<\/h2>\n\n\n\n<p>Rettighedseskalering til administrator er i praksis ofte lig med fuldt site-compromise. Med admin-adgang kan en angriber bl.a.:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n\n<li>Installere eller uploade plugins\/temaer (inkl. ondsindede zip-filer med backdoors)<\/li>\n\n\n<li>\u00c6ndre indhold og injicere spam eller redirecte bes\u00f8gende<\/li>\n\n\n<li>Oprette nye brugere og \u201cl\u00e5se\u201d legitime brugere ude<\/li>\n\n\n<li>\u00c6ndre settings, webhooks, integrationsn\u00f8gler og andre driftkritiske konfigurationer<\/li>\n\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Den tekniske \u00e5rsag: role-validering f\u00f8lger ikke feltets \u201cAllow User Role\u201d-begr\u00e6nsning<\/h2>\n\n\n\n<p>ACF Extended lader dig definere et feltgruppe-setup til brugerdata (email, username, password og evt. role). I UI\u2019et findes der en indstilling som \u201cAllow User Role\u201d, der umiddelbart signalerer, at roller kan begr\u00e6nses. Men i den s\u00e5rbare version bliver den begr\u00e6nsning ikke h\u00e5ndh\u00e6vet p\u00e5 form-submit-niveau.<\/p>\n\n\n\n<p>Wordfence beskriver, at det handler om pluginets <code>insert_user()<\/code>-flow, hvor der bygges et <code>$args<\/code> array og derefter kaldes <code>wp_insert_user($args)<\/code>. Hvis <code>role<\/code> kan komme med i <code>$args<\/code> uden tilstr\u00e6kkelig whitelist\/validering, bliver WordPress bedt om at oprette brugeren med pr\u00e6cis den rolle.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Et forsimplet billede af m\u00f8nsteret<\/h3>\n\n\n\n<div class=\"wp-block-kevinbatdorf-code-block-pro\" data-code-block-pro-font-family=\"Code-Pro-JetBrains-Mono\" style=\"font-size:.875rem;font-family:Code-Pro-JetBrains-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.25rem;--cbp-tab-width:2;tab-size:var(--cbp-tab-width, 2)\"><span style=\"display:block;padding:16px 0 0 16px;margin-bottom:-1px;width:100%;text-align:left;background-color:#24292e\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"54\" height=\"14\" viewBox=\"0 0 54 14\"><g fill=\"none\" fill-rule=\"evenodd\" transform=\"translate(1 1)\"><circle cx=\"6\" cy=\"6\" r=\"6\" fill=\"#FF5F56\" stroke=\"#E0443E\" stroke-width=\".5\"><\/circle><circle cx=\"26\" cy=\"6\" r=\"6\" fill=\"#FFBD2E\" stroke=\"#DEA123\" stroke-width=\".5\"><\/circle><circle cx=\"46\" cy=\"6\" r=\"6\" fill=\"#27C93F\" stroke=\"#1AAB29\" stroke-width=\".5\"><\/circle><\/g><\/svg><\/span><span role=\"button\" tabindex=\"0\" style=\"color:#e1e4e8;display:none\" aria-label=\"Copy\" class=\"code-block-pro-copy-button\"><pre class=\"code-block-pro-copy-button-pre\" aria-hidden=\"true\"><textarea class=\"code-block-pro-copy-button-textarea\" tabindex=\"-1\" aria-hidden=\"true\" readonly>&lt;?php\n\/\/ Forenklet eksempel af m\u00f8nsteret Wordfence beskriver:\n\n$args = [];\n\n\/\/ ... $args bygges fra de felter, du mapper i formularen\n\/\/ hvis 'role' er mappet, kan angriberen fors\u00f8ge at sende 'administrator'\n\n$user_id = wp_insert_user($args);\n\n\/\/ Hvis $args['role'] ikke valideres\/whitelistes, kan det blive en admin.\n\n<\/textarea><\/pre><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" style=\"width:24px;height:24px\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path class=\"with-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M9 5H7a2 2 0 00-2 2v12a2 2 0 002 2h10a2 2 0 002-2V7a2 2 0 00-2-2h-2M9 5a2 2 0 002 2h2a2 2 0 002-2M9 5a2 2 0 012-2h2a2 2 0 012 2m-6 9l2 2 4-4\"><\/path><path class=\"without-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M9 5H7a2 2 0 00-2 2v12a2 2 0 002 2h10a2 2 0 002-2V7a2 2 0 00-2-2h-2M9 5a2 2 0 002 2h2a2 2 0 002-2M9 5a2 2 0 012-2h2a2 2 0 012 2\"><\/path><\/svg><\/span><pre class=\"shiki github-dark\" style=\"background-color:#24292e;color:#e1e4e8\" tabindex=\"0\"><code><span class=\"line\"><span style=\"color:#F97583\">&#x3C;?<\/span><span style=\"color:#79B8FF\">php<\/span><\/span>\n<span class=\"line\"><span style=\"color:#6A737D\">\/\/ Forenklet eksempel af m\u00f8nsteret Wordfence beskriver:<\/span><\/span>\n<span class=\"line\"><\/span>\n<span class=\"line\"><span style=\"color:#E1E4E8\">$args <\/span><span style=\"color:#F97583\">=<\/span><span style=\"color:#E1E4E8\"> [];<\/span><\/span>\n<span class=\"line\"><\/span>\n<span class=\"line\"><span style=\"color:#6A737D\">\/\/ ... $args bygges fra de felter, du mapper i formularen<\/span><\/span>\n<span class=\"line\"><span style=\"color:#6A737D\">\/\/ hvis 'role' er mappet, kan angriberen fors\u00f8ge at sende 'administrator'<\/span><\/span>\n<span class=\"line\"><\/span>\n<span class=\"line\"><span style=\"color:#E1E4E8\">$user_id <\/span><span style=\"color:#F97583\">=<\/span><span style=\"color:#B392F0\"> wp_insert_user<\/span><span style=\"color:#E1E4E8\">($args);<\/span><\/span>\n<span class=\"line\"><\/span>\n<span class=\"line\"><span style=\"color:#6A737D\">\/\/ Hvis $args['role'] ikke valideres\/whitelistes, kan det blive en admin.<\/span><\/span>\n<span class=\"line\"><\/span><\/code><\/pre><\/div>\n\n\n\n<div class=\"wp-block-group callout callout-info is-style-info is-layout-flow wp-block-group-is-layout-flow\" style=\"border-width:1px;border-radius:8px;padding-top:1rem;padding-right:1.5rem;padding-bottom:1rem;padding-left:1.5rem\">\n\n<h4 class=\"wp-block-heading callout-title\">Hvorfor er det en \u201cklassiker\u201d i form-byggere?<\/h4>\n\n\n<p>N\u00e5r formularer kan mappe felter direkte til objekt-argumenter (her: user args), skal man v\u00e6re ekstremt striks med whitelists p\u00e5 server-side. UI-baserede begr\u00e6nsninger er ikke nok, fordi en angriber kan sende r\u00e5 requests direkte til endpointet.<\/p>\n\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Hvilke versioner er ramt \u2013 og hvad er fixet?<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n\n<li><strong>Ramt:<\/strong> Advanced Custom Fields: Extended <strong><= 0.9.2.1<\/strong><\/li>\n\n\n<li><strong>Patchet:<\/strong> <strong>0.9.2.2<\/strong><\/li>\n\n\n<li><strong>CVE:<\/strong> <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-14533\">CVE-2025-14533<\/a><\/li>\n\n\n<li><strong>CVSS:<\/strong> 9.8 (Critical)<\/li>\n\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Hvad skal du g\u00f8re p\u00e5 dine sites (praktisk tjekliste)<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n\n<li>Opdat\u00e9r ACF Extended til <strong>0.9.2.2<\/strong> eller nyere med det samme.<\/li>\n\n\n<li>Find alle ACF Extended-forms med actions af typen <strong>Create user<\/strong> eller <strong>Update user<\/strong>.<\/li>\n\n\n<li>Tjek om der er et felt (eller mapping) der ender som <code>role<\/code> i submit \u2013 is\u00e6r hvis feltet er synligt for ikke-loggede brugere.<\/li>\n\n\n<li>Hvis du ikke har et reelt behov for at lade brugere v\u00e6lge rolle: fjern <code>role<\/code>-feltet fra formularen\/mappingen helt.<\/li>\n\n\n<li>Gennemg\u00e5 brugere for nyligt oprettede admin-konti, hvis du har v\u00e6ret p\u00e5 en s\u00e5rbar version og har den relevante formular-ops\u00e6tning.<\/li>\n\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Wordfence-beskyttelse og disclosure-forl\u00f8b (kort)<\/h2>\n\n\n\n<p>If\u00f8lge Wordfence blev s\u00e5rbarheden rapporteret via deres Bug Bounty Program og valideret i december 2025. Wordfence udsendte en firewall-regel til betalende kunder kort efter valideringen, mens brugere af gratis-versionen fik samme regel senere. Plugin-udvikleren udgav patchen (0.9.2.2) f\u00e5 dage efter rapporten.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n\n<li>Indsendt til Wordfence: <strong>10. december 2025<\/strong><\/li>\n\n\n<li>Valideret + firewall-regel til Premium\/Care\/Response: <strong>11. december 2025<\/strong><\/li>\n\n\n<li>Patch udgivet af ACF Extended-teamet: <strong>14. december 2025<\/strong><\/li>\n\n\n<li>Firewall-regel til Wordfence Free: <strong>10. januar 2026<\/strong><\/li>\n\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Opsummering<\/h2>\n\n\n\n<p>CVE-2025-14533 i ACF Extended er en kritisk privilege escalation, som i bestemte ACF Extended-form-ops\u00e6tninger kan give en uautentificeret angriber admin-adgang ved at indsende <code>role=administrator<\/code>. Den hurtigste og vigtigste handling er at opdatere til <strong>0.9.2.2<\/strong> og derefter verificere, at dine brugeroprettelses-\/opdateringsformularer ikke eksponerer eller mapper roller ukontrolleret.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1600\" src=\"https:\/\/helloblog.io\/app\/uploads\/sites\/14\/2026\/01\/acfe-1-scaled-1.png\" alt=\"Sk\u00e6rmbillede af ACF Extended feltgruppe med brugerfelter inklusive rolle-indstilling\" class=\"wp-image-149\" srcset=\"https:\/\/helloblog.io\/app\/uploads\/sites\/14\/2026\/01\/acfe-1-scaled-1.png 2560w, https:\/\/helloblog.io\/app\/uploads\/sites\/14\/2026\/01\/acfe-1-scaled-1-300x188.png 300w, https:\/\/helloblog.io\/app\/uploads\/sites\/14\/2026\/01\/acfe-1-scaled-1-1024x640.png 1024w, https:\/\/helloblog.io\/app\/uploads\/sites\/14\/2026\/01\/acfe-1-scaled-1-768x480.png 768w, https:\/\/helloblog.io\/app\/uploads\/sites\/14\/2026\/01\/acfe-1-scaled-1-1536x960.png 1536w, https:\/\/helloblog.io\/app\/uploads\/sites\/14\/2026\/01\/acfe-1-scaled-1-2048x1280.png 2048w, https:\/\/helloblog.io\/app\/uploads\/sites\/14\/2026\/01\/acfe-1-scaled-1-400x250.png 400w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><figcaption class=\"wp-element-caption\">ACF Extended kan konfigurere brugerfelter i en feltgruppe, inkl. et role-felt med indstillinger. \u2014 <em>Forr\u00e1s: Wordfence.com<\/em><\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1599\" src=\"https:\/\/helloblog.io\/app\/uploads\/sites\/14\/2026\/01\/acfe-2-scaled-1.png\" alt=\"Sk\u00e6rmbillede af ACF Extended form action til oprettelse af bruger og mapping af felter\" class=\"wp-image-150\" srcset=\"https:\/\/helloblog.io\/app\/uploads\/sites\/14\/2026\/01\/acfe-2-scaled-1.png 2560w, https:\/\/helloblog.io\/app\/uploads\/sites\/14\/2026\/01\/acfe-2-scaled-1-300x187.png 300w, https:\/\/helloblog.io\/app\/uploads\/sites\/14\/2026\/01\/acfe-2-scaled-1-1024x640.png 1024w, https:\/\/helloblog.io\/app\/uploads\/sites\/14\/2026\/01\/acfe-2-scaled-1-768x480.png 768w, https:\/\/helloblog.io\/app\/uploads\/sites\/14\/2026\/01\/acfe-2-scaled-1-1536x959.png 1536w, https:\/\/helloblog.io\/app\/uploads\/sites\/14\/2026\/01\/acfe-2-scaled-1-2048x1279.png 2048w, https:\/\/helloblog.io\/app\/uploads\/sites\/14\/2026\/01\/acfe-2-scaled-1-400x250.png 400w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><figcaption class=\"wp-element-caption\">Formular-actions kan mappe felter til user-oprettelse\/opdatering; her opst\u00e5r risikoen hvis role mappes uden server-side begr\u00e6nsning. \u2014 <em>Forr\u00e1s: Wordfence.com<\/em><\/figcaption><\/figure>\n\n\n<div class=\"references-section\">\n                <h2>Referencer \/ Kilder<\/h2>\n                <ul class=\"references-list\"><li><a href=\"https:\/\/www.wordfence.com\/blog\/2026\/01\/100000-wordpress-sites-affected-by-privilege-escalation-vulnerability-in-advanced-custom-fields-extended-wordpress-plugin\/\" target=\"_blank\" rel=\"noopener noreferrer\">100,000 WordPress Sites Affected by Privilege Escalation Vulnerability in Advanced Custom Fields: Extended WordPress Plugin<\/a><\/li><li><a href=\"https:\/\/www.wordfence.com\/threat-intel\/vulnerabilities\/wordpress-plugins\/acf-extended\/advanced-custom-fields-extended-0921-unauthenticated-privilege-escalation-via-insert-user-form-action\" target=\"_blank\" rel=\"noopener noreferrer\">Advanced Custom Fields: Extended &lt;= 0.9.2.1 &#8212; Unauthenticated Privilege Escalation via Insert User Form Action<\/a><\/li><li><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-14533\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2025-14533<\/a><\/li><li><a href=\"https:\/\/wordpress.org\/plugins\/acf-extended\/\" target=\"_blank\" rel=\"noopener noreferrer\">Advanced Custom Fields: Extended (acf-extended)<\/a><\/li><\/ul>\n            <\/div>","protected":false},"excerpt":{"rendered":"<p>ACF Extended har haft en kritisk fejl, der i bestemte setups kan lade en uautentificeret bruger g\u00f8re sig selv til administrator. Her er, hvad der er ramt, hvorfor det sker, og hvad du skal tjekke i dine formularer.<\/p>\n","protected":false},"author":65,"featured_media":148,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[75,16,59,13,10],"class_list":["post-151","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sikkerhed","tag-acf-extended","tag-privilege-escalation","tag-saarbarheder","tag-wordfence","tag-wordpress"],"_links":{"self":[{"href":"https:\/\/helloblog.io\/da\/wp-json\/wp\/v2\/posts\/151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/helloblog.io\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/helloblog.io\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/helloblog.io\/da\/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https:\/\/helloblog.io\/da\/wp-json\/wp\/v2\/comments?post=151"}],"version-history":[{"count":0,"href":"https:\/\/helloblog.io\/da\/wp-json\/wp\/v2\/posts\/151\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/helloblog.io\/da\/wp-json\/wp\/v2\/media\/148"}],"wp:attachment":[{"href":"https:\/\/helloblog.io\/da\/wp-json\/wp\/v2\/media?parent=151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/helloblog.io\/da\/wp-json\/wp\/v2\/categories?post=151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/helloblog.io\/da\/wp-json\/wp\/v2\/tags?post=151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}