Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 08 Apr 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Danbilabs
Danbilabs advanced Members For Acf Wordpress Wordpress wordpress |
|
| Vendors & Products |
Danbilabs
Danbilabs advanced Members For Acf Wordpress Wordpress wordpress |
Wed, 08 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Advanced Members for ACF plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the create_crop function in all versions up to, and including, 1.2.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). The vulnerability was partially patched in version 1.2.5. | |
| Title | Advanced Members for ACF <= 1.2.5 - Authenticated (Subscriber+) Arbitrary File Deletion via Path Traversal | |
| Weaknesses | CWE-22 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:41:44.695Z
Reserved: 2026-02-26T02:55:32.603Z
Link: CVE-2026-3243
Updated: 2026-04-08T14:16:47.994Z
Status : Deferred
Published: 2026-04-08T12:16:21.610
Modified: 2026-04-24T18:05:09.240
Link: CVE-2026-3243
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:39:49Z