CVE-2025-10487: CWE-94 Improper Control of Generation of Code ('Code Injection') in monetizemore Advanced Ads – Ad Manager & AdSense
The Advanced Ads – Ad Manager & AdSense plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.0.12 via the select_one() function. This is due to the endpoint not properly restricting access to the AJAX endpoint or limiting the functions that can be called to safe functions. This makes it possible for unauthenticated attackers to call arbitrary functions beginning with get_the_ like get_the_excerpt which can make information exposure possible.
AI Analysis
Technical Summary
CVE-2025-10487 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code), affecting the Advanced Ads – Ad Manager & AdSense plugin for WordPress in all versions up to 2.0.12. The vulnerability stems from the select_one() function, which exposes an AJAX endpoint that does not properly restrict access or limit callable functions to safe ones. This design flaw allows unauthenticated attackers to invoke arbitrary functions beginning with get_the_, such as get_the_excerpt, enabling remote code execution (RCE) and information disclosure. The vulnerability is exploitable over the network without authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 7.3, indicating high severity, with impacts on confidentiality, integrity, and availability. Although no public exploits are known yet, the vulnerability's nature suggests that exploitation could lead to unauthorized data access, code execution on the server, and potential site takeover. The plugin is widely used by WordPress sites for managing ads and integrating with AdSense, making the attack surface significant. The lack of patch links indicates that a fix may not yet be available, emphasizing the need for immediate mitigation steps. The vulnerability was reserved in September 2025 and published in November 2025, reflecting recent discovery and disclosure.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, particularly for those relying on WordPress sites with the Advanced Ads plugin to manage advertising content. Successful exploitation can lead to unauthorized disclosure of sensitive information, including excerpts and potentially other content accessible via get_the_ functions. Remote code execution can allow attackers to modify site content, inject malicious code, or pivot to other internal systems, compromising data integrity and availability. Given the plugin's role in ad management, attacks could disrupt revenue streams and damage brand reputation. The ease of exploitation without authentication or user interaction increases the likelihood of automated attacks and widespread compromise. Organizations in sectors with high digital advertising dependency, such as media, e-commerce, and marketing agencies, face elevated risks. Additionally, compromised sites could be used to distribute malware or conduct phishing campaigns targeting European users, amplifying the threat landscape.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the vulnerable AJAX endpoint by implementing server-side access controls, such as IP whitelisting or authentication requirements, until an official patch is released. Deploy web application firewall (WAF) rules to detect and block requests attempting to invoke unauthorized functions, particularly those targeting get_the_ prefixed functions. Site administrators should monitor logs for suspicious AJAX calls and unusual activity related to the Advanced Ads plugin. It is critical to maintain regular backups of WordPress sites to enable rapid restoration in case of compromise. Once available, promptly apply official patches or updates from the plugin vendor. Consider disabling or removing the Advanced Ads plugin temporarily if mitigation controls cannot be effectively implemented. Additionally, conduct security audits of WordPress installations to identify other potential vulnerabilities and ensure all plugins and themes are up to date. Educate site administrators about the risks of unauthenticated AJAX endpoints and the importance of least privilege principles in plugin design.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-10487: CWE-94 Improper Control of Generation of Code ('Code Injection') in monetizemore Advanced Ads – Ad Manager & AdSense
Description
The Advanced Ads – Ad Manager & AdSense plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.0.12 via the select_one() function. This is due to the endpoint not properly restricting access to the AJAX endpoint or limiting the functions that can be called to safe functions. This makes it possible for unauthenticated attackers to call arbitrary functions beginning with get_the_ like get_the_excerpt which can make information exposure possible.
AI-Powered Analysis
Technical Analysis
CVE-2025-10487 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code), affecting the Advanced Ads – Ad Manager & AdSense plugin for WordPress in all versions up to 2.0.12. The vulnerability stems from the select_one() function, which exposes an AJAX endpoint that does not properly restrict access or limit callable functions to safe ones. This design flaw allows unauthenticated attackers to invoke arbitrary functions beginning with get_the_, such as get_the_excerpt, enabling remote code execution (RCE) and information disclosure. The vulnerability is exploitable over the network without authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 7.3, indicating high severity, with impacts on confidentiality, integrity, and availability. Although no public exploits are known yet, the vulnerability's nature suggests that exploitation could lead to unauthorized data access, code execution on the server, and potential site takeover. The plugin is widely used by WordPress sites for managing ads and integrating with AdSense, making the attack surface significant. The lack of patch links indicates that a fix may not yet be available, emphasizing the need for immediate mitigation steps. The vulnerability was reserved in September 2025 and published in November 2025, reflecting recent discovery and disclosure.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, particularly for those relying on WordPress sites with the Advanced Ads plugin to manage advertising content. Successful exploitation can lead to unauthorized disclosure of sensitive information, including excerpts and potentially other content accessible via get_the_ functions. Remote code execution can allow attackers to modify site content, inject malicious code, or pivot to other internal systems, compromising data integrity and availability. Given the plugin's role in ad management, attacks could disrupt revenue streams and damage brand reputation. The ease of exploitation without authentication or user interaction increases the likelihood of automated attacks and widespread compromise. Organizations in sectors with high digital advertising dependency, such as media, e-commerce, and marketing agencies, face elevated risks. Additionally, compromised sites could be used to distribute malware or conduct phishing campaigns targeting European users, amplifying the threat landscape.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the vulnerable AJAX endpoint by implementing server-side access controls, such as IP whitelisting or authentication requirements, until an official patch is released. Deploy web application firewall (WAF) rules to detect and block requests attempting to invoke unauthorized functions, particularly those targeting get_the_ prefixed functions. Site administrators should monitor logs for suspicious AJAX calls and unusual activity related to the Advanced Ads plugin. It is critical to maintain regular backups of WordPress sites to enable rapid restoration in case of compromise. Once available, promptly apply official patches or updates from the plugin vendor. Consider disabling or removing the Advanced Ads plugin temporarily if mitigation controls cannot be effectively implemented. Additionally, conduct security audits of WordPress installations to identify other potential vulnerabilities and ensure all plugins and themes are up to date. Educate site administrators about the risks of unauthenticated AJAX endpoints and the importance of least privilege principles in plugin design.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-15T14:29:17.900Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6905ae02e1b1aafea8d7ec78
Added to database: 11/1/2025, 6:51:46 AM
Last enriched: 11/10/2025, 2:32:14 AM
Last updated: 12/16/2025, 8:07:11 PM
Views: 73
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-8872: CWE-400 Uncontrolled Resource Consumption in Arista Networks EOS
HighCVE-2025-68142: CWE-1333: Inefficient Regular Expression Complexity in facelessuser pymdown-extensions
LowCVE-2025-65589: n/a
UnknownCVE-2025-65581: n/a
MediumCVE-2025-52196: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.