CVE-2025-10487: CWE-94 Improper Control of Generation of Code ('Code Injection') in monetizemore Advanced Ads – Ad Manager & AdSense
The Advanced Ads – Ad Manager & AdSense plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.0.12 via the select_one() function. This is due to the endpoint not properly restricting access to the AJAX endpoint or limiting the functions that can be called to safe functions. This makes it possible for unauthenticated attackers to call arbitrary functions beginning with get_the_ like get_the_excerpt which can make information exposure possible.
AI Analysis
Technical Summary
CVE-2025-10487 is a remote code execution vulnerability found in the Advanced Ads – Ad Manager & AdSense plugin for WordPress, affecting all versions up to and including 2.0.12. The vulnerability stems from the select_one() function, which handles AJAX requests but fails to properly restrict access or limit callable functions to safe ones. Specifically, unauthenticated attackers can invoke arbitrary functions prefixed with get_the_, such as get_the_excerpt, through the AJAX endpoint. This improper control of code generation (CWE-94) allows attackers to execute unauthorized code remotely, potentially leading to information disclosure, data manipulation, or full system compromise depending on the functions accessible. The vulnerability requires no authentication or user interaction, making it highly exploitable over the network. Although no public exploits have been reported yet, the plugin’s widespread use in WordPress sites globally increases the risk of future exploitation. The CVSS v3.1 base score of 7.3 reflects the vulnerability’s network attack vector, low attack complexity, no privileges required, and significant impacts on confidentiality, integrity, and availability. The lack of patch links suggests that a fix may not yet be available, underscoring the urgency for mitigations or vendor updates.
Potential Impact
The impact of CVE-2025-10487 is substantial for organizations using the affected WordPress plugin. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary code on the web server. This can result in unauthorized access to sensitive information, website defacement, data corruption, or the deployment of malware such as web shells or ransomware. The vulnerability compromises confidentiality by exposing information through functions like get_the_excerpt, integrity by enabling unauthorized code execution, and availability by potentially disrupting website operations. Given the plugin’s role in managing ads, exploitation could also lead to fraudulent ad manipulation or revenue loss. The ease of exploitation without authentication or user interaction increases the likelihood of automated attacks and widespread compromise. Organizations relying on this plugin for ad management face risks to their web infrastructure, customer trust, and regulatory compliance.
Mitigation Recommendations
1. Immediate mitigation should include disabling or restricting access to the vulnerable AJAX endpoint if possible, using web application firewalls (WAF) or server-level access controls to block unauthorized requests targeting the select_one() function. 2. Monitor web server logs for suspicious AJAX requests invoking get_the_ functions or unusual activity patterns. 3. Limit the plugin’s permissions and isolate the WordPress environment to reduce potential damage from exploitation. 4. Apply principle of least privilege to WordPress user roles and database access to minimize impact if compromised. 5. Regularly update the plugin once the vendor releases a patch addressing this vulnerability. 6. Employ runtime application self-protection (RASP) or intrusion detection systems (IDS) to detect and block exploitation attempts. 7. Educate site administrators on the risks and encourage prompt action to mitigate exposure. 8. Consider alternative ad management solutions if a timely patch is unavailable.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, Brazil, France, Netherlands, Japan, South Korea, Italy, Spain
CVE-2025-10487: CWE-94 Improper Control of Generation of Code ('Code Injection') in monetizemore Advanced Ads – Ad Manager & AdSense
Description
The Advanced Ads – Ad Manager & AdSense plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.0.12 via the select_one() function. This is due to the endpoint not properly restricting access to the AJAX endpoint or limiting the functions that can be called to safe functions. This makes it possible for unauthenticated attackers to call arbitrary functions beginning with get_the_ like get_the_excerpt which can make information exposure possible.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-10487 is a remote code execution vulnerability found in the Advanced Ads – Ad Manager & AdSense plugin for WordPress, affecting all versions up to and including 2.0.12. The vulnerability stems from the select_one() function, which handles AJAX requests but fails to properly restrict access or limit callable functions to safe ones. Specifically, unauthenticated attackers can invoke arbitrary functions prefixed with get_the_, such as get_the_excerpt, through the AJAX endpoint. This improper control of code generation (CWE-94) allows attackers to execute unauthorized code remotely, potentially leading to information disclosure, data manipulation, or full system compromise depending on the functions accessible. The vulnerability requires no authentication or user interaction, making it highly exploitable over the network. Although no public exploits have been reported yet, the plugin’s widespread use in WordPress sites globally increases the risk of future exploitation. The CVSS v3.1 base score of 7.3 reflects the vulnerability’s network attack vector, low attack complexity, no privileges required, and significant impacts on confidentiality, integrity, and availability. The lack of patch links suggests that a fix may not yet be available, underscoring the urgency for mitigations or vendor updates.
Potential Impact
The impact of CVE-2025-10487 is substantial for organizations using the affected WordPress plugin. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary code on the web server. This can result in unauthorized access to sensitive information, website defacement, data corruption, or the deployment of malware such as web shells or ransomware. The vulnerability compromises confidentiality by exposing information through functions like get_the_excerpt, integrity by enabling unauthorized code execution, and availability by potentially disrupting website operations. Given the plugin’s role in managing ads, exploitation could also lead to fraudulent ad manipulation or revenue loss. The ease of exploitation without authentication or user interaction increases the likelihood of automated attacks and widespread compromise. Organizations relying on this plugin for ad management face risks to their web infrastructure, customer trust, and regulatory compliance.
Mitigation Recommendations
1. Immediate mitigation should include disabling or restricting access to the vulnerable AJAX endpoint if possible, using web application firewalls (WAF) or server-level access controls to block unauthorized requests targeting the select_one() function. 2. Monitor web server logs for suspicious AJAX requests invoking get_the_ functions or unusual activity patterns. 3. Limit the plugin’s permissions and isolate the WordPress environment to reduce potential damage from exploitation. 4. Apply principle of least privilege to WordPress user roles and database access to minimize impact if compromised. 5. Regularly update the plugin once the vendor releases a patch addressing this vulnerability. 6. Employ runtime application self-protection (RASP) or intrusion detection systems (IDS) to detect and block exploitation attempts. 7. Educate site administrators on the risks and encourage prompt action to mitigate exposure. 8. Consider alternative ad management solutions if a timely patch is unavailable.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-15T14:29:17.900Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6905ae02e1b1aafea8d7ec78
Added to database: 11/1/2025, 6:51:46 AM
Last enriched: 2/27/2026, 6:26:10 PM
Last updated: 3/24/2026, 11:23:55 AM
Views: 120
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.