Advanced Custom Fields : CPT Options Pages Security & Risk Analysis

wordpress.org/plugins/acf-cpt-options-pages

Small addon for ACF Options. Adds ACF location for each custom post type. New feature in the major version 2! Important! After update to v2+ you must …

2K active installs v2.0.9 PHP + WP 3.0+ Updated Apr 8, 2023
acf-optionsadvanced-custom-fieldsarchivecustom-post-type
63
C · Use Caution
CVEs total1
Unpatched1
Last CVESep 21, 2025
Safety Verdict

Is Advanced Custom Fields : CPT Options Pages Safe to Use in 2026?

Use With Caution

Score 63/100

Advanced Custom Fields : CPT Options Pages has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Sep 21, 2025Updated 2yr ago
Risk Assessment

The 'acf-cpt-options-pages' plugin v2.0.9 exhibits a concerning security posture, despite a lack of immediately exploitable entry points identified in the static analysis. The presence of a single dangerous function, 'unserialize', without any apparent sanitization or capability checks, presents a significant risk. This, combined with 100% of its outputs being unescaped, creates a high potential for Cross-Site Scripting (XSS) vulnerabilities if the unserialized data is rendered directly in the browser.

The taint analysis indicates a flow with an unsanitized path, although it is not classified as critical or high severity. This suggests that while there might be a way to inject data that is not properly cleaned, its impact is currently assessed as low. However, the plugin has a known vulnerability history, including one unpatched medium severity CVE and a common pattern of Cross-Site Request Forgery (CSRF) vulnerabilities. This history indicates a recurring weakness in input validation and state-changing operations, which, when combined with the lack of capability checks and nonce checks on the limited attack surface, can be exploited.

Overall, while the plugin has strengths such as using prepared statements for SQL queries and having no apparent external HTTP requests, the significant risks posed by 'unserialize' without checks, unescaped output, and a history of CSRF vulnerabilities outweigh these positives. The lack of authorization checks on the few potential interaction points, coupled with the aforementioned issues, necessitates caution and prompt remediation.

Key Concerns

  • Unpatched medium severity CVE
  • Dangerous function 'unserialize' without checks
  • 100% of outputs unescaped
  • Flow with unsanitized path
  • No nonce checks
  • No capability checks
Vulnerabilities
1

Advanced Custom Fields : CPT Options Pages Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-60208medium · 4.3Cross-Site Request Forgery (CSRF)

Advanced Custom Fields : CPT Options Pages <= 2.0.9 - Cross-Site Request Forgery

Sep 21, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Advanced Custom Fields : CPT Options Pages Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
10
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$cpts_enabled = unserialize($get_cpts_enabled);class.acf-cpt-options-pages.php:44

Output Escaping

0% escaped10 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<tpl-settings-page> (tpl-settings-page.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Advanced Custom Fields : CPT Options Pages Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_noticesclass.acf-cpt-options-pages.php:10
actioninitclass.acf-cpt-options-pages.php:16
actionadmin_menuclass.acf-cpt-options-pages.php:17
actioninitcpt-acf.php:45
Maintenance & Trust

Advanced Custom Fields : CPT Options Pages Maintenance & Trust

Maintenance Signals

WordPress version tested6.2.9
Last updatedApr 8, 2023
PHP min version
Downloads63K

Community Trust

Rating100/100
Number of ratings7
Active installs2K
Developer Profile

Advanced Custom Fields : CPT Options Pages Developer Profile

Tusko Trush

2 plugins · 2K total installs

76
trust score
Avg Security Score
74/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Advanced Custom Fields : CPT Options Pages

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/acf-cpt-options-pages/assets/acf-cpt-logic.js
Script Paths
/wp-content/plugins/acf-cpt-options-pages/assets/acf-cpt-logic.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Advanced Custom Fields : CPT Options Pages