| Plugin Name | Advanced Custom Fields: Font Awesome Field |
|---|---|
| Type of Vulnerability | Cross-Site Scripting (XSS) |
| CVE Number | CVE-2026-6415 |
| Urgency | Medium |
| CVE Publish Date | 2026-05-18 |
| Source URL | CVE-2026-6415 |
Urgent Security Advisory: Stored XSS in Advanced Custom Fields — Font Awesome Field (CVE-2026-6415) — What WordPress Site Owners Must Do Now
From the desk of a Hong Kong security expert — concise, practical guidance for administrators and developers.
Executive summary
A stored cross-site scripting (XSS) vulnerability has been disclosed in the “Advanced Custom Fields: Font Awesome Field” plugin (affecting versions ≤ 5.0.2). Tracked as CVE-2026-6415, the issue allows an authenticated user with Subscriber-level privileges (or higher where such input is accepted) to store a crafted payload that may execute when administrators, editors, or other users view the affected content.
This vulnerability is rated Medium (CVSS 6.5). Exploitation requires an authenticated user to store the payload and a second user to view or interact with the stored content, but the risk is significant for sites that accept user registrations, front-end submissions, or display ACF data in admin contexts without proper encoding.
What happened (plain language)
- Vulnerable plugin: Advanced Custom Fields: Font Awesome Field
- Affected versions: ≤ 5.0.2
- Patched version: 6.0.0 (update as soon as possible)
- Vulnerability type: Stored Cross-Site Scripting (XSS)
- CVE: CVE-2026-6415
- Required privilege: Authenticated subscriber (low-level account)
- Impact: Injection of malicious script that executes when stored content is viewed — possible session theft, privilege escalation, content manipulation, or admin account compromise
- User interaction: Required — an attacker needs a privileged or targeted user to open content or act on a malicious UI element
In short: a low-privileged user can save HTML/script-like payloads in a Font Awesome field and cause that payload to execute later when rendered without proper sanitization/encoding.
Why this matters for WordPress site owners
Advanced Custom Fields (ACF) is widely used for custom fields and metadata. The Font Awesome Field extension stores icon data and related metadata. If user-supplied values are stored and later echoed into admin pages or the front-end without escaping, stored XSS can occur.
Many sites allow new user registrations, front-end submissions, or have multiple authors. Membership sites, forums, multi-author blogs, and e-commerce customer accounts are common examples where Subscriber-like accounts can exist. Stored XSS persists in the database and can affect many users over time, making it more dangerous than reflected XSS.
Technical overview (conceptual)
Stored XSS arises when untrusted input is accepted, stored (e.g., postmeta, usermeta), and later output into a page without correct encoding. In this case, the Font Awesome field accepted values that could include HTML or JavaScript-like constructs. When those values were output into an admin or other viewable page without sufficient encoding, the browser executed the injected script.
Possible consequences:
- Stealing authentication cookies (if not adequately protected)
- Performing actions on behalf of logged-in users (CSRF-like flows combined with XSS)
- Installing backdoors or writing malicious content into the site
- Redirecting users to phishing pages or delivering drive-by malware
- Exfiltrating sensitive data present in admin pages
Modern mitigations (HttpOnly cookies, CSP) reduce some impact, but stored XSS remains a potent post-exploitation primitive.
Who is at risk?
- Sites running Advanced Custom Fields: Font Awesome Field plugin versions ≤ 5.0.2.
- Sites allowing user registration, front-end post submission, or membership features where low-privileged users can edit profiles or submit data stored in ACF fields.
- Sites that display ACF meta values on admin screens, editor screens, or public pages without proper encoding.
- Sites where editors/admins preview or view user-submitted content in trusted contexts.
If you are unsure whether the plugin is present, check the plugin list in wp-admin or look for plugin directories on the file system.
Immediate actions (what to do now — prioritized)
- Check installed version and update immediately
Go to wp-admin → Plugins and locate “Advanced Custom Fields: Font Awesome Field”. If the installed version is 6.0.0 or newer, you are patched. If ≤ 5.0.2, update to 6.0.0 as soon as feasible.
- If you cannot update right away, temporarily deactivate or remove the plugin
Deactivating prevents the vulnerable code from running and is a practical short-term mitigation. If the field is critical and cannot be removed, adopt other controls listed below until you can update.
- Restrict registrations and Subscriber-level submissions
Limit account creation or require admin approval for new users. Temporarily disable front-end submission capabilities that write to ACF fields.
- Harden admin viewing behavior
Instruct administrators and editors to avoid opening or previewing untrusted user-submitted content until the issue is resolved. Avoid clicking unfamiliar links or UI elements from new accounts.
- Apply WAF rules / virtual patching where available
Deploy targeted rules to block exploit attempts against ACF field keys. Typical rule patterns to consider: