CVE-2025-4380: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in scripteo Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager
The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.89 via the 'bsa_template' parameter of the `bsa_preview_callback` function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases .php files can can be uploaded and included, or already exist on the site.
AI Analysis
Technical Summary
CVE-2025-4380 is a critical vulnerability classified under CWE-98 (Improper Control of Filename for Include/Require Statement in PHP Programs), affecting the Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager developed by scripteo. This vulnerability exists in all versions up to and including 4.89 of the plugin. The flaw arises from insecure handling of the 'bsa_template' parameter within the 'bsa_preview_callback' function, which allows an unauthenticated attacker to perform Local File Inclusion (LFI). Through this vulnerability, an attacker can manipulate the parameter to include arbitrary files from the server, potentially executing arbitrary PHP code if the included files contain executable PHP scripts. This can lead to full compromise of the web server hosting the vulnerable WordPress site. The attack does not require authentication or user interaction, increasing its risk. The CVSS v3.1 base score is 8.1, reflecting high severity with network attack vector, high complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the nature of the vulnerability makes it a prime target for exploitation once publicly disclosed. The absence of available patches at the time of disclosure further elevates the risk for affected installations. Given that WordPress is widely used across Europe and Ads Pro Plugin is a popular advertising management tool, this vulnerability poses a significant threat to websites relying on this plugin, potentially leading to data breaches, defacement, or full server takeover.
Potential Impact
For European organizations, the impact of CVE-2025-4380 can be severe. Many businesses, media companies, and e-commerce platforms in Europe utilize WordPress with advertising plugins like Ads Pro to manage monetization. Exploitation could lead to unauthorized access to sensitive customer data, intellectual property, and internal systems. The ability to execute arbitrary PHP code on the server can result in website defacement, insertion of malicious content (such as malware or phishing pages), and pivoting to internal networks. This can damage brand reputation, lead to regulatory non-compliance under GDPR due to data breaches, and cause operational disruptions. Small and medium enterprises (SMEs), which often rely on third-party plugins without extensive security audits, are particularly vulnerable. Additionally, public sector websites using WordPress could face risks to public trust and service availability. The high severity and unauthenticated nature of the vulnerability mean attackers can rapidly exploit it at scale, increasing the likelihood of widespread incidents across European digital infrastructure.
Mitigation Recommendations
1. Immediate mitigation involves disabling or removing the Ads Pro Plugin until a secure patched version is released. 2. Restrict access to the vulnerable functionality by implementing web application firewall (WAF) rules that block requests containing suspicious 'bsa_template' parameter values or attempts to include local files. 3. Harden PHP configurations by disabling dangerous functions such as 'allow_url_include' and restricting file inclusion paths using 'open_basedir' directives. 4. Monitor web server logs for unusual requests targeting the 'bsa_template' parameter or attempts to access sensitive files. 5. Conduct a thorough security audit of all installed plugins and themes to identify other potential vulnerabilities. 6. Once a patch is available, promptly apply it and verify the fix through testing. 7. Implement file integrity monitoring to detect unauthorized changes to PHP files. 8. Educate site administrators on secure plugin management and the risks of using outdated or unsupported plugins. 9. Consider deploying intrusion detection/prevention systems (IDS/IPS) tailored for WordPress environments to detect exploitation attempts. These steps go beyond generic advice by focusing on immediate risk reduction, proactive monitoring, and configuration hardening specific to this vulnerability and WordPress plugin ecosystem.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-4380: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in scripteo Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager
Description
The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.89 via the 'bsa_template' parameter of the `bsa_preview_callback` function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases .php files can can be uploaded and included, or already exist on the site.
AI-Powered Analysis
Technical Analysis
CVE-2025-4380 is a critical vulnerability classified under CWE-98 (Improper Control of Filename for Include/Require Statement in PHP Programs), affecting the Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager developed by scripteo. This vulnerability exists in all versions up to and including 4.89 of the plugin. The flaw arises from insecure handling of the 'bsa_template' parameter within the 'bsa_preview_callback' function, which allows an unauthenticated attacker to perform Local File Inclusion (LFI). Through this vulnerability, an attacker can manipulate the parameter to include arbitrary files from the server, potentially executing arbitrary PHP code if the included files contain executable PHP scripts. This can lead to full compromise of the web server hosting the vulnerable WordPress site. The attack does not require authentication or user interaction, increasing its risk. The CVSS v3.1 base score is 8.1, reflecting high severity with network attack vector, high complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the nature of the vulnerability makes it a prime target for exploitation once publicly disclosed. The absence of available patches at the time of disclosure further elevates the risk for affected installations. Given that WordPress is widely used across Europe and Ads Pro Plugin is a popular advertising management tool, this vulnerability poses a significant threat to websites relying on this plugin, potentially leading to data breaches, defacement, or full server takeover.
Potential Impact
For European organizations, the impact of CVE-2025-4380 can be severe. Many businesses, media companies, and e-commerce platforms in Europe utilize WordPress with advertising plugins like Ads Pro to manage monetization. Exploitation could lead to unauthorized access to sensitive customer data, intellectual property, and internal systems. The ability to execute arbitrary PHP code on the server can result in website defacement, insertion of malicious content (such as malware or phishing pages), and pivoting to internal networks. This can damage brand reputation, lead to regulatory non-compliance under GDPR due to data breaches, and cause operational disruptions. Small and medium enterprises (SMEs), which often rely on third-party plugins without extensive security audits, are particularly vulnerable. Additionally, public sector websites using WordPress could face risks to public trust and service availability. The high severity and unauthenticated nature of the vulnerability mean attackers can rapidly exploit it at scale, increasing the likelihood of widespread incidents across European digital infrastructure.
Mitigation Recommendations
1. Immediate mitigation involves disabling or removing the Ads Pro Plugin until a secure patched version is released. 2. Restrict access to the vulnerable functionality by implementing web application firewall (WAF) rules that block requests containing suspicious 'bsa_template' parameter values or attempts to include local files. 3. Harden PHP configurations by disabling dangerous functions such as 'allow_url_include' and restricting file inclusion paths using 'open_basedir' directives. 4. Monitor web server logs for unusual requests targeting the 'bsa_template' parameter or attempts to access sensitive files. 5. Conduct a thorough security audit of all installed plugins and themes to identify other potential vulnerabilities. 6. Once a patch is available, promptly apply it and verify the fix through testing. 7. Implement file integrity monitoring to detect unauthorized changes to PHP files. 8. Educate site administrators on secure plugin management and the risks of using outdated or unsupported plugins. 9. Consider deploying intrusion detection/prevention systems (IDS/IPS) tailored for WordPress environments to detect exploitation attempts. These steps go beyond generic advice by focusing on immediate risk reduction, proactive monitoring, and configuration hardening specific to this vulnerability and WordPress plugin ecosystem.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-06T13:13:59.893Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6864b0fa6f40f0eb72917174
Added to database: 7/2/2025, 4:09:30 AM
Last enriched: 7/2/2025, 4:27:27 AM
Last updated: 7/17/2025, 2:37:56 AM
Views: 13
Related Threats
CVE-2025-7765: SQL Injection in code-projects Online Appointment Booking System
MediumCVE-2025-7764: SQL Injection in code-projects Online Appointment Booking System
MediumCVE-2025-7763: Open Redirect in thinkgem JeeSite
MediumCVE-2025-7762: Stack-based Buffer Overflow in D-Link DI-8100
HighCVE-2025-6391: CWE-532: Insertion of Sensitive Information into Log File in Broadcom Brocade ASCG
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.