Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| hwk-fr | Advanced Custom Fields: Extended | 0.9.0.5 ~ 0.9.1.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Vulnerable setup for CVE-2025-13486 - Advanced Custom Fields: Extended - Remote Code Execution | https://github.com/0xnemian/CVE-2025-13486.-CVE-2025-13486 | POC Details |
| 2 | POC for CVE-2025-13486 | https://github.com/0xanis/CVE-2025-13486-POC | POC Details |
| 3 | Docker test environment for CVE-2025-13486 (ACF Extended RCE). For security research only. | https://github.com/KrE80r/cve-2025-13486-vuln-setup | POC Details |
| 4 | The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Remote Code Execution in versions 0.9.0.5 through 0.9.1.1 via the prepare_form() function. | https://github.com/MataKucing-OFC/CVE-2025-13486 | POC Details |
| 5 | Advanced Custom Fields Extended (ACFE) WordPress Plugin Exploit RCE - Admin Creation | https://github.com/0xgh057r3c0n/CVE-2025-13486 | POC Details |
| 6 | None | https://github.com/pukixploit/CVE-2025-13486 | POC Details |
| 7 | Advanced Custom Fields: Extended WordPress plugin 0.9.0.5 through 0.9.1.1 contains a remote code execution caused by unsafe use of call_user_func_array() in prepare_form() function, letting unauthenticated attackers execute arbitrary code remotely. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-13486.yaml | POC Details |
| 8 | CVE-2025-13486 - Remote Code Execution & Privilege Escalation exploit | https://github.com/whattheslime/CVE-2025-13486-exploit | POC Details |
No public POC found.
Login to generate AI POCNo comments yet