CVE-2025-4380
📋 TL;DR
This vulnerability allows unauthenticated attackers to include and execute arbitrary PHP files on WordPress servers running the Ads Pro Plugin. Attackers can achieve remote code execution, bypass access controls, and access sensitive data. All WordPress sites using Ads Pro Plugin versions up to 4.89 are affected.
💻 Affected Systems
- Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager
📦 What is this software?
Ads Pro by Scripteo
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise leading to data theft, malware deployment, and persistent backdoor access
Likely Case
Website defacement, data exfiltration, and installation of cryptocurrency miners or backdoors
If Mitigated
Limited impact if file uploads are restricted and server permissions are properly configured
🎯 Exploit Status
Simple HTTP request manipulation required; no authentication needed
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.90 or later
Vendor Advisory: https://codecanyon.net/item/ads-pro-plugin-multipurpose-wordpress-advertising-manager/10275010
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find Ads Pro Plugin
4. Click 'Update Now' if available
5. If not available, download version 4.90+ from CodeCanyon and manually update
🔧 Temporary Workarounds
Disable vulnerable endpoint via .htaccess
linuxBlocks access to the vulnerable callback function
RewriteEngine On
RewriteCond %{QUERY_STRING} bsa_preview_callback [NC]
RewriteRule .* - [F,L]
Disable plugin temporarily
allDeactivate the plugin until patched
wp plugin deactivate ads-pro-plugin
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block requests containing 'bsa_template' parameter
- Restrict file upload capabilities and implement strict file permission controls
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Ads Pro Plugin version number
Check Version:
wp plugin get ads-pro-plugin --field=version
Verify Fix Applied:
Verify plugin version is 4.90 or higher in WordPress admin
📡 Detection & Monitoring
Log Indicators:
- HTTP requests containing 'bsa_preview_callback' with 'bsa_template' parameter
- Unusual file inclusion attempts in web server logs
Network Indicators:
- POST/GET requests to /wp-admin/admin-ajax.php with bsa_preview_callback action
- Traffic patterns showing file path traversal attempts
SIEM Query:
source="web_access.log" AND ("bsa_preview_callback" OR "bsa_template")