Skip to main content

CVE-2025-5339: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in scripteo Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager

High
VulnerabilityCVE-2025-5339cvecve-2025-5339cwe-89
Published: Wed Jul 02 2025 (07/02/2025, 03:47:26 UTC)
Source: CVE Database V5
Vendor/Project: scripteo
Product: Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager

Description

The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to time-based SQL Injection via the ‘bsa_pro_id’ parameter in all versions up to, and including, 4.89 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI-Powered Analysis

AILast updated: 07/02/2025, 04:25:30 UTC

Technical Analysis

CVE-2025-5339 is a high-severity SQL Injection vulnerability affecting the Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager developed by scripteo. This plugin is widely used to manage advertising on WordPress websites. The vulnerability arises from improper neutralization of special elements in the 'bsa_pro_id' parameter, which is insufficiently escaped and not properly prepared in SQL queries. This flaw allows unauthenticated attackers to perform time-based SQL Injection attacks by appending malicious SQL code to existing queries. Exploitation can lead to unauthorized extraction of sensitive data from the backend database without requiring any authentication or user interaction. The vulnerability affects all versions up to and including 4.89 of the plugin. The CVSS 3.1 base score is 7.5, reflecting a high severity due to network attack vector, low attack complexity, no privileges required, no user interaction, and high confidentiality impact. Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk given the popularity of WordPress and the plugin's role in managing advertising content, which often involves sensitive business and user data. The lack of available patches at the time of disclosure increases the urgency for mitigation.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to the confidentiality of data hosted on WordPress sites using the Ads Pro Plugin. Attackers exploiting this flaw can extract sensitive information such as user data, advertising metrics, and potentially payment or business intelligence data stored in the database. This could lead to data breaches violating GDPR requirements, resulting in legal penalties and reputational damage. Additionally, compromised advertising platforms could be manipulated to display unauthorized or malicious content, undermining trust and potentially causing financial losses. Given the widespread use of WordPress in Europe across various sectors including e-commerce, media, and SMEs, the impact could be broad. Organizations relying on this plugin for ad management should consider the risk of targeted attacks aiming to exploit this vulnerability to gain footholds or exfiltrate data.

Mitigation Recommendations

Immediate mitigation steps include disabling or removing the vulnerable Ads Pro Plugin until a secure patch is released. Organizations should monitor official vendor channels for updates and apply patches promptly once available. In the interim, implementing Web Application Firewall (WAF) rules to detect and block suspicious SQL injection payloads targeting the 'bsa_pro_id' parameter can reduce exposure. Conducting thorough audits of WordPress plugins to identify and remove unused or outdated components is recommended. Additionally, restricting database user permissions to the minimum necessary can limit the impact of successful injection attempts. Logging and monitoring database query anomalies and web server logs for unusual patterns related to this parameter can aid in early detection of exploitation attempts. Finally, organizations should ensure regular backups and have incident response plans ready to address potential breaches stemming from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-29T21:44:56.553Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6864b0fa6f40f0eb72917188

Added to database: 7/2/2025, 4:09:30 AM

Last enriched: 7/2/2025, 4:25:30 AM

Last updated: 7/13/2025, 4:00:12 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats