CVE-2025-69311

7.6 HIGH

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Broadstreet Ads WordPress plugin that allows attackers to bypass access controls. Attackers can exploit incorrectly configured security levels to perform unauthorized actions. All WordPress sites running Broadstreet Ads plugin versions up to and including 1.52.1 are affected.

💻 Affected Systems

Products:
  • Broadstreet Ads WordPress Plugin
Versions: All versions up to and including 1.52.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Broadstreet Ads plugin installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the WordPress site including unauthorized content modification, plugin/theme installation, or administrative takeover.

🟠

Likely Case

Unauthorized modification of ad placements, settings changes, or data exposure within the plugin's scope.

🟢

If Mitigated

No impact if proper authorization checks are implemented and access controls are correctly configured.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access but bypasses authorization checks. The vulnerability is in access control logic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.52.1

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/broadstreet/vulnerability/wordpress-broadstreet-ads-plugin-1-52-1-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Broadstreet Ads plugin. 4. Click 'Update Now' if available. 5. If no update available, deactivate and remove the plugin.

🔧 Temporary Workarounds

Disable Broadstreet Ads Plugin

all

Temporarily deactivate the vulnerable plugin until patched version is available

wp plugin deactivate broadstreet

Restrict Plugin Access

all

Use WordPress user role management to restrict who can access plugin settings

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access the WordPress admin interface
  • Enable detailed logging and monitoring for unauthorized access attempts to plugin functionality

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Broadstreet Ads version. If version is 1.52.1 or lower, you are vulnerable.

Check Version:

wp plugin list --name=broadstreet --field=version

Verify Fix Applied:

After updating, verify Broadstreet Ads plugin version is higher than 1.52.1 in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Broadstreet Ads endpoints
  • Unexpected plugin setting changes
  • Failed authorization checks in plugin logs

Network Indicators:

  • Unusual requests to /wp-admin/admin-ajax.php with broadstreet parameters
  • Requests to plugin-specific endpoints from unauthorized users

SIEM Query:

source="wordpress" AND (uri_path="*broadstreet*" OR user_agent="*broadstreet*") AND (response_code=200 OR response_code=302) AND user_role!="administrator"

🔗 References

📤 Share & Export