CVE-2024-49593
WordPress vulnerability analysis and mitigation

Overview

In Advanced Custom Fields (ACF) before 6.3.9 and Secure Custom Fields before 6.3.6.3 (plugins for WordPress), a stored Cross-Site Scripting (XSS) vulnerability was discovered. The vulnerability allows authenticated attackers with administrator-level access to inject arbitrary web scripts through the Field Group editor when editing plugin fields. This vulnerability primarily affects multi-site installations and installations where unfiltered_html has been disabled (WPScan, NVD).

Technical details

The vulnerability is classified as a Stored Cross-Site Scripting (CWE-79) issue with a CVSS v3.1 Base Score of 5.3 (Medium). The vulnerability stems from insufficient input sanitization and output escaping in the Field Group editor, specifically when handling ACF field labels. This security flaw allows for the execution of stored XSS payloads when editing plugin fields (NVD, WPScan).

Impact

The vulnerability enables authenticated attackers with administrator-level access to inject malicious web scripts that will execute whenever a user accesses an affected page. The impact is primarily limited to multi-site installations and installations where unfiltered_html has been disabled (WPScan).

Mitigation and workarounds

Users are advised to update to Advanced Custom Fields version 6.3.9 or Secure Custom Fields version 6.3.6.3 or later to address this vulnerability. For users of the free version of ACF, an alternative update mechanism is available through WP Engine (ACF Blog).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management