Secure Custom Fields by WordPress.org
What Changed with ACF / “Secure Custom Fields”
- WordPress.org took control of the
advanced-custom-fieldsplugin entry, changed the owner to WordPress.org, renamed it “Secure Custom Fields” (SCF), and removed commercial/pro upgrade hooks. - The slug/URL, install base, ratings, and reviews remain the same, so existing sites will receive SCF updates under the old ACF identifier.
- Some say the pro edition has always been a separate plugin, so only upsell/upgrade prompts were removed; others argue this still breaks expectations and potentially some setups.
Security Vulnerability and Patch Debate
- WordPress.org claims an urgent security issue justified intervening and pushing a minimal fix.
- A reserved CVE is referenced, but full details are not public; one link suggests the original maintainers had already shipped a security release.
- Diff analysis shows small changes around blocking access to
$_REQUEST/$_POSTin callbacks. Several commenters argue this is either:- a legitimate but partial/brittle hardening step, or
- not a meaningful fix and mainly a pretext for the takeover.
- Timeline and which vulnerability is being fixed are described as unclear and disputed.
GPL, Trademarks, and Directory Policy
- Many accept that GPL allows forking the free ACF code; the controversy is about hijacking the existing listing rather than publishing a separate fork.
- Commenters point to plugin guidelines forbidding “100% copies” and trademark-like slugs without proof of rights, and note that ACF and “ACF” have pending trademark applications.
- Others argue ACF (the free plugin) is not “premium” and that policies may have been selectively reinterpreted or edited after the fact.
Legal and Ethical Concerns
- Multiple comments mention potential “tortious interference” and trademark issues due to redirecting traffic, installs, and goodwill away from the commercial owner of ACF.
- Several see this as retaliation tied to an ongoing legal dispute between WordPress leadership and the hosting company that owns ACF, rather than a neutral security intervention.
Impact on Developers and Users
- Developers report disabling auto-updates on client sites to avoid SCF updates they no longer trust.
- Some fear future hostile takeovers of other plugins, degradation of ACF Pro compatibility, or use of core to disadvantage competitors.
- A number of long‑time WordPress agencies and plugin authors say this breaks the implicit trust that the plugin directory is neutral and stable.
Community Trust, Governance, and Fork Talk
- Many describe this as “one of the sleaziest things” they have seen in open source governance and worry it could trigger a serious WordPress fork.
- Several note key community members stepping back from core initiatives and fields APIs in protest.
- Some argue the root issue is systemic: commercial entities building on FOSS without “giving back,” but most replies focus on the immediate damage from unilateral actions by WordPress leadership.
Alternatives and Exit Discussions
- A few commenters mention moving away from WordPress entirely, citing smaller CMSs or frameworks (e.g., ProcessWire, custom systems).
- There is visible sympathy for competitors and alternative CMS ecosystems, with some explicitly welcoming “refugees” from WordPress.